Andy Miller wrote:
We don't know of any security vulnerabilities in Gantry. I'm not sure what the issue is based on your screenshots. What was found that you feel is not correct? The first image shows firebug which is the output from a rendered page, and the second screenshot is just the first line of a php file?
You will see that there are url's and other information that shouldn't be there - apparently they link to porn sites. It looks Russian or eastern european and mentions the word porno. Not something I would have put in there!
The second screenshot is the path to the file that was hacked.
I went into the Template manager and selected the edit HTML file which happens to be the file that was hacked and deleted the lines. I was tipped off by a University IT person that happened to visit our site.
The question is how could they hack into this file that is sitting in the Templates folders associated with Quantive and Gantry?
I have updated to the latest Gantry version as a precaution in any case.
Any ideas would be more than welcome. This is a school site.