Couldn't find that but after looking found another provider that attempted it on me. nice.Just in case you providers using SolusVM didn't know, you can find the IPs clients logged in with under the Client Log page in SolusVM.
How do you know ? Could have been a VPN/proxy from their IP space. Unless they were logged in, of course.Couldn't find that but after looking found another provider that attempted it on me. nice.
IP matches logins of them doing actions to the VM, it wasn't IP space of a server its a home connection.How do you know ? Could have been a VPN/proxy from their IP space. Unless they were logged in, of course.
Well, by the looks of it the vuln could be used on kvm nodes aswell. Or am I wrong?Well, found someone who tried to exploit BlueVM's SolusVM. THIS is why we use HyperVM, not SolusVM, for our OpenVZ!
That's just a php shell script, uploaded after gaining access via the vuln, not the vuln itself.Even remote commands were possible.
Looks fine to me, fortunately.Not confirmed, but it seems as though something is going on with BudgetVM/Enzu, Inc... Can't confirm because their phone is down as well as their ticket system...