-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Hacker" script poking at wwsympa sso_login generates lots of email to listmaster #1654
Labels
Comments
Hi @dpc22, |
certainly looks plausible if "intern" is the cause of the messages to listmaster. Thank you. |
I agree. I don't think it's a good idea to send emergency notices to administrators via email. |
Fail2ban or similar is the better tool to cope with incoming crap. |
ikedas
added a commit
that referenced
this issue
Jun 13, 2023
WWSympa: Invalid input on sso_login form floods listmaster notification (#1654)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Version
6.2.70
Installation method
My own RPM, derived from "offical" RHEL rpm
Expected behavior
wwsympa shouldn't generate notification emails to listmaster just because an unknown Web client submitted a HTTP GET or POST with invalid parameters: that is outside our control.
Actual behavior
I received about 120 messages of the form:
this morning. These seem to correspond to:
("User could not be identified, no mail HTTP header set" seems to be significant. wwsympa logged about 5000 attempted SQL injection attacks, but only a small fraction generated emails).
Additional information
This is related to a ticket that I opened about 18 months back: #1244
While the denial of service attack element seems to have been fixed (that was definitely the more important aspect), it looks like people poking at sso_login can still generate emails to listmaster.
The text was updated successfully, but these errors were encountered: