I got a possible attack the other day, running RC3:
Please let me know if this is a bug, or someone trying to hack my site.. I think it's a bug since my site isen't even public yet...
------------------------------------------------------------------
MIME-Version: 1.0
From: =?UTF-8?B?QXZsaWph?= <contact@xxx.net>
Message-Id: <20091215111120.A87C527E03F0@CentOS-53-32-minimal.localdomain>
Date: Tue, 15 Dec 2009 12:11:20 +0100 (CET)
Total impact: 36
Affected tags: xss, csrf, id, rfe, lfi
Variable: REQUEST.DescriptionMe.0 | Value: mycB4Q <a href=\"http://jvrhoenvdwob.com/\">jvrhoenvdwob</a>, [url=http://oeitbmxpadif.com/]oeitbmxpadif[/url], [link=http://kbdqoqkycyuw.com/]kbdqoqkycyuw[/link], http://stxxffbxrnuh.com/
Impact: 9 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61
Variable: REQUEST.DescriptionMe.1 | Value: mycB4Q <a href=\"http://jvrhoenvdwob.com/\">jvrhoenvdwob</a>, [url=http://oeitbmxpadif.com/]oeitbmxpadif[/url], [link=http://kbdqoqkycyuw.com/]kbdqoqkycyuw[/link], http://stxxffbxrnuh.com/
Impact: 9 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61
Variable: POST.DescriptionMe.0 | Value: mycB4Q <a href=\"http://jvrhoenvdwob.com/\">jvrhoenvdwob</a>, [url=http://oeitbmxpadif.com/]oeitbmxpadif[/url], [link=http://kbdqoqkycyuw.com/]kbdqoqkycyuw[/link], http://stxxffbxrnuh.com/
Impact: 9 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61
Variable: POST.DescriptionMe.1 | Value: mycB4Q <a href=\"http://jvrhoenvdwob.com/\">jvrhoenvdwob</a>, [url=http://oeitbmxpadif.com/]oeitbmxpadif[/url], [link=http://kbdqoqkycyuw.com/]kbdqoqkycyuw[/link], http://stxxffbxrnuh.com/
Impact: 9 | Tags: xss, csrf, id, rfe, lfi
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects url injections and RFE attempts | Tags: id, rfe, lfi | ID: 61
REMOTE_ADDR: 67.169.62.19
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /var/www/html/join.php
QUERY_STRING:
REQUEST_URI: http://www.xxx.net/join.php
QUERY_STRING:
SCRIPT_NAME: /join.php
PHP_SELF: /join.php