|
Postback script vulnerablilities
I've been having a lot of trouble with people being able to create
ID's without any problem using ACPayPostBack.cgi and the various other postback CGI's. These guys do not know the script passes, but they can still use them to create accounts.
I'm just in the process of renaming all the cgi's, but what else can be done to improve security with these scripts once the hackers find their locations once again? Are all the cgi's from various processors vulnerable?
|