We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on v1 candidate and expect to engage more with the community over the coming months. We are committed to open source, and we encourage contributors to help us build the future of Vesta.
Search found 336 matches
- Thu Apr 19, 2018 12:02 pm
- Forum: Modification & Patches
- Topic: [PLUGIN] VestaCP Tools Plugin
- Replies: 25
- Views: 188412
Re: [PLUGIN] VestaCP Tools Plugin
I'll get this fixed in another release. Works for me now though!moucho wrote: ↑Thu Apr 19, 2018 5:49 amIt seems that https://www.kryogenix.org/code/browser/ ... rttable.js is not accessible at the moment :(
- Wed Apr 11, 2018 12:09 pm
- Forum: Modification & Patches
- Topic: [HOWTO] Install CSF + Use it's GUI in VestaCP
- Replies: 150
- Views: 686235
- Mon Apr 09, 2018 5:16 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 756885
Re: Got 10 VestaCP servers exploited
DO were trying to mitigate the attack. Many of my DO servers were taken offline by DO and they were not even compromised.
- Mon Apr 09, 2018 8:51 am
- Forum: Modification & Patches
- Topic: [HOWTO] Install CSF + Use it's GUI in VestaCP
- Replies: 150
- Views: 686235
- Sun Apr 08, 2018 10:04 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 756885
Re: Got 10 VestaCP servers exploited
Its on GitHub https://github.com/serghey-rodin/vesta/commit/eaf9d89096b11daa97f8da507eb369e359cda7dd It will be on main servers soon To update now from GitHub: cd $(mktemp -d) git clone git://github.com/serghey-rodin/vesta.git yes | /usr/bin/cp -rf vesta/* /usr/local/vesta install GIT before this H...
- Sun Apr 08, 2018 2:14 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 756885
Re: Got 10 VestaCP servers exploited
$v_password = tempnam("/tmp","vst"); $fp = fopen($v_password, "w"); fwrite($fp, $_POST['password']."\n"); fclose($fp); $v_ip_addr = escapeshellarg($_SERVER["REMOTE_ADDR"]); exec(VESTA_CMD ."v-check-user-password ".$v_user." ".$v_password." '".$v_ip_addr."'", $output, $auth_code); unlink($v_password...
- Sun Apr 08, 2018 2:08 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 756885
Re: Got 10 VestaCP servers exploited
By looking at the file he's restricted to /usr/local/vesta/bin/ Can you send a list of files you have in that directory to see if the exploit is in the current code, or perhaps he added his own file with unrestricted access. Have you added any third party scripts such as App Installers? Usually thes...
- Sun Apr 08, 2018 1:51 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 756885
Re: Got 10 VestaCP servers exploited
Edit this file: /usr/local/vesta/web/api/index.php
Add this in line 3:
Code: Select all
file_put_contents('/tmp/postlog.txt', print_r($_POST, true));
- Sat Mar 17, 2018 7:50 pm
- Forum: Web Server
- Topic: HOWTO: Install PHP7.0 or PHP 7.2 on CentOS 7
- Replies: 102
- Views: 1080717
Re: HOWTO: Install PHP7.0 or PHP 7.2 on CentOS 7
No need to restart, just restart Apache as it’s part of the whole thing. As long as you linked php-cgi together too you’ll be fine!
- Sat Mar 17, 2018 5:55 pm
- Forum: Web Server
- Topic: HOWTO: Install PHP7.0 or PHP 7.2 on CentOS 7
- Replies: 102
- Views: 1080717
Re: HOWTO: Install PHP7.0 or PHP 7.2 on CentOS 7
Sorry I forgot to tell you to uninstall the php-fpm
Yum remove php72-php-fpm
Yum remove php72-php-fpm