VestaCP漏洞修补更新
Thanks@安之若素 大佬: http://www.hostloc.com/forum.php ... p;highlight=vestacp
@fkj大佬 http://www.hostloc.com/forum.php ... p;highlight=vestacp
skid wrote Sun Apr 08, 2018 10:26 pm
https://forum.vestacp.com/viewtopic.php?f=10&t=16556&start=260#p68893
The fix has been released just now!
As usually there are 3 ways to update your server:
1. Via web interface
- Login as admin
- Go to updates tab
- Click un update button under vesta package
2. Via package manager
- SSH as root to your server
- yum update / apt-get update && apt-get upgrade
3. Via GitHub
- SSH as root
- Install git / yum install git /apt-get install git
- Then run following commands
Code: Select all
cd $(mktemp -d)
git clone git://github.com/serghey-rodin/vesta.git
/bin/cp -rf vesta/* /usr/local/vesta/
Some information about this indecent. We still don't have working exploit for previous version. But we know for sure that the vector of attack was through a potentially unsecure password check method. Therefore we have completely rewrite password auth function. It's bullet proof now!
Please upgrade your servers as soon as possible.
我不是你的 发表于 2018-4-10 09:47
等你折腾好了,告诉我一下
我不折腾了,准备用宝塔算了。。
lol.gif
落日惊鸿 发表于 2018-4-10 00:22
我正在小鸡上测试,准备拿去TX云安装正式上线。。看到你这句话,我又得折腾了 ...
等你折腾好了,告诉我一下 http://www.kvm.la/901.html
gcc.sh这玩意还附带有联动,要关机后才好全部清除。
14年15年就发现很多这玩意了。 本帖最后由 fkj 于 2018-4-9 14:59 编辑
顺便提醒一下这次的补丁只是修复了通过验证密码漏洞取得root权限运行脚本的部分,但是要到这一步必须先把脚本上传到服务器上,所以如果证实是组合漏洞的话可能还会有第二部分补丁防止上传脚本,大家随时关注。 感谢 完全看不懂
lol.gif
国内用这个的人应该不太多,平时也不见mjj讨论这个。 正在用这个,谢谢 先升级一波再说
页:
[1]
2