SolusVM Exploit

  • Sunday, 16th June, 2013
  • 07:49am

PLEASE READ THIS INFORMATION CAREFULLY. THIS INFORMATION IS RELEVANT TO ALL VERSION OF SOLUSVM, INCLUDING BETA VERSIONS.

 

In the last few hours a security exploit has been found. This email is to inform you of a temporary fix to eliminate this exploit whilst the issue is patched and transferred to our file servers for release.

 

Instructions:

 

You will need root SSH access to your master server.  You are then required to delete the following file:

 

/usr/local/solusvm/www/centralbackup.php

 

Example:

 

rm –f /usr/local/solusvm/www/centralbackup.php

Once the file is deleted the exploit can no longer be used. This file only exists on the master server and the slaves will not be affected.

 

More info on

http://www.webhostingtalk.com/showthread.php?t=1276286

http://localhost.re/p/solusvm-11303-vulnerabilities


 

« Back