Hi all-- I hope this is an appropriate forum for this question.
I built a site using a popular open-source CMS for a client about a year ago. They wanted to host with their current host, which I didn't like much but agreed to. Now the site has been hacked, as well as many other sites on the same server (built by the host) with a 301 redirect script that send any traffic from Google to a spam site.
I can't see any obvious changes to my code or any injections-- however, the host is trying to blame me for the security breaches, since supposedly some of my directory permission were lax, and they have some questions about "code".
I don't deny there's a possibility there was an attack vector through the CMS code-- but my question is this:
isn't it the hosts responsibility to chroot users and keep them in their own "jail" so they can't affect other users' sites? On a properly secured server, wouldn't my folder permissions be largely irrelevant to other users?
Thanks for any input