MySQL.com (the official site for the MySQL database) was compromised via (shocking!) blind SQL injection. A post was sent today to the full disclosure list explaining the issue and dumping part of their internal database structure.
Vulnerable Target : http://mysql.com/customers/view/index.html?id=1170
Host IP : 22.214.171.124
Web Server : Apache/2.2.15 (Fedora)
Powered-by : PHP/5.2.13
Injection Type : MySQL Blind
Current DB : web
So their customer view application was used as the entry point, where the attackers were able to list the internal databases, tables and password dump…
What is worse is that they also posted the password dump online and some people started to crack it already. Some of the findings are pretty bad, like that the password used by the MySQL director of product management is only 4 numbers (6661).
We will post more details as we learn more about it.
Tips for Hiring Security Guard Companies in Los Angeles - Security is a paramount concern for businesses, residential complexes, events, and institutions in Los Angeles. To safeguard assets, ensure the safety of...
2 mesi fa