The widespread vBulletin CMS has a vulnerability that allows remote attackers to create new administrative accounts. Back in August, users of versions in the 4.1+ and 5+ series were advised to delete the /install/ or /core/install/ directories (depending on version) as a workaround against the bug, but vBulletin didn't advise of …
Shirly deleting the installation stuff is the very first thing you do with any script after a successful install?
I can't see why the script can't just do this itself, many other CMS scripts have done so for years or nagged you to death everytime you login to the admin panel.
Even "lowly" OSS apps like phpBB refuse to run if the install directory exists. In fact, phpBB shuts down the forum if the install directory exists. Someone deserves a major boot to the nads for this idiocy. Even moreso since this product costs $$$.
- Breaking news: Google exec in terrifying SKY PLUNGE DRAMA
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Google chief Larry Page gives Sundar Pichai keys to the kingdom
- Adobe spies on readers: EVERY DRM page turn leaked to base over SSL