Over time, I have found a suspicious argument/value pair in some request uri's on my site. For example, the last one looked like:
Requested URI: /&status=900&status=900&status=900&status=900&status=900&status=900
&status=900&status=900&status=900&status=900&status=900&status=900
&status=900&status=900&status=900&status=900&status=900&status=900
&status=900&status=900&status=900&status=900
I've noticed the repeating argument a number of times, always "&status=900". Sometimes, but rarely, it is added to the end of a valid script name
My question to the php Gods who reside here: is this a known hacking attempt at some vulnerability? I have searched this board, and many search engines for some information, but have found absolutely nothing. So I'm hoping that I can ignore this oddity. But then again, I have heard that 4.4.1 fixes a huge vulnerability in $_GLOBAL. Don't know if this is related.
I use register_globals OFF and I declare all variables in my scripts. My server admin will be going to php 4.4.1 as soon as zend optimizer is compatible with that version. So, I feel that I am safe, but then worry that it's only a false sense of security.
Any comments are appreciated.