New type of PA attack

Received this email this morning.  I didn't cause it and nobody is registered at my site besides myself so it might be a real possible attack.  I've never seen this type listed as it seems to deal with javascripting.

Total impact: 18
Affected tags: xss, csrf, id, rfe

Variable: REQUEST.ID | Value: javascript: void(0);
Impact: 9 | Tags: xss, csrf, id, rfe
Description: Detects possible includes and packed functions | Tags: xss, csrf, id, rfe | ID: 14
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20

Variable: GET.ID | Value: javascript: void(0);
Impact: 9 | Tags: xss, csrf, id, rfe
Description: Detects possible includes and packed functions | Tags: xss, csrf, id, rfe | ID: 14
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20

REMOTE_ADDR: 85.25.124.132
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /public_html/profile.php
QUERY_STRING: ID=javascript: void(0);
REQUEST_URI: /javascript:%20void(0);
QUERY_STRING: ID=javascript: void(0);
SCRIPT_NAME: /profile.php
PHP_SELF: /profile.php
Quote · 20 Nov 2009

Have you added any HTML blocks with javascript codes to your profile.php file? If not, I would say it seems like a legit block.

Nothing to see here
Quote · 20 Nov 2009

Nothing.  I went to bed last night around midnight.  Timestamp from this was 5am.

Quote · 20 Nov 2009

Then I would say it was a legit block.. Woo Hoo.

Hey, why didnt you answer my email regarding my language file Yell

lol

Nothing to see here
Quote · 20 Nov 2009

sorry forgot lol

Quote · 20 Nov 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.