Results (
Japanese) 1:
[Copy]Copied!
Exploitation of Vulnerability in Web
Application
Vulnerability in web applications other
than CMS products can be exploited, too. For example, if SQL injection vulnerability is exploited, the contents using databases can be falsified.
Sharp rise in Website HackingII
According to JPCERT/CC, monthly website hacking incidents reached over 4,000 in June and July 2013 – more than doubled compared to incidents from January to April 2013.
Hacking of Websites hosted on Rental Service ServersIII
In September 2013, a local web server rental service reported that 8,438 websites had been falsified. The attack exploited vulnerability in a WordPress plugin among other things. The rental service vendor reported that through a malicious file uploaded by the attacker, the information of a configuration file (wp-config.php file) was obtained by the attacker, which allowed the attacker to falsify the users’ database and websites.
Secure Server
Secure accounts and password
Keep software up to date
Take measures to resolve/mitigate
vulnerability in web applications Attacks targeting a website exploit misconfiguration of the system and/or vulnerability in software. It is important to take necessary measures to prevent vulnerabilities and conduct vulnerability assessments when developing and configuring a website, and secure the web server. It is also important to maintain the effort for proper operation and monitoring at the operational phase such as keeping software up to date on a regular basis, managing access permission, and detecting unauthorized modification to the
website.
Being translated, please wait..
