The widespread vBulletin CMS has a vulnerability that allows remote attackers to create new administrative accounts. Back in August, users of versions in the 4.1+ and 5+ series were advised to delete the /install/ or /core/install/ directories (depending on version) as a workaround against the bug, but vBulletin didn't advise of …
Shirly deleting the installation stuff is the very first thing you do with any script after a successful install?
I can't see why the script can't just do this itself, many other CMS scripts have done so for years or nagged you to death everytime you login to the admin panel.
Even "lowly" OSS apps like phpBB refuse to run if the install directory exists. In fact, phpBB shuts down the forum if the install directory exists. Someone deserves a major boot to the nads for this idiocy. Even moreso since this product costs $$$.
- Updated Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
- Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
- Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
- Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
- Android engineer: We DIDN'T copy Apple OR follow Samsung's orders