|This article needs additional citations for verification. (April 2009)|
|Stable release||3.1.0 / December 17, 2014|
|License||GNU General Public License and proprietary|
Revive Adserver (formerly OpenX Source) is an open-source advertising server that is licensed under the GNU General Public License. It features an integrated banner management interface and tracking system for gathering statistics. In Sep 2013, OpenX source was sold to Andrew Hill and rebranded Revive Adserver. The current code base for OpenX Company and OpenX Source are completely separate.
The software enables web site administrators to rotate banners from both in-house advertisement campaigns as well as from paid or third-party sources, such as Google's AdSense. OpenX provides standard banner rotation, click tracking, zone-based ad selection, zone-based campaign targeting, direct ad selection, ad targeting (per browser, domain, language, etc.), ad capping and support for Adobe Flash banners.
OpenX began as phpAdsNew, a fork from a similar project called phpAds, created by Tobias Ratschiller in 1998. When the phpAds project came to a halt in 2000, Wim Godden decided to create phpAdsNew by expanding the project with new features. He hoped the 'New' moniker would be temporary, lasting only until Ratschiller could update the phpAds website. Unfortunately, this only happened years later, after the name phpAdsNew was too well established to be changed.
During the time period between 2001 and 2002, Wim Godden led the phpAdsNew project and later received help from developers such as Niels Leenheer and Phil Hord, continually adding new features and improving the existing ones. After the release of version 1.9, a completely revised version 2.0 was created. This task was led by Niels Leenheer. The new version included many new features as well as a revised graphical user interface.
After gaining in popularity and earning support from the open-source community, the project was renamed to OpenAds. Features that were built for phpAdsNew 2.0 were also integrated into the latest OpenAds software, which at this point had reached version 2.3.
When version 2.4.4 was released in 2007, OpenAds was once again rebranded under a new name: OpenX. The final 2.4 version is v2.4.11 and was released in March 2009.
Revive Adserver can be extended with help of plug-ins.
In August 2013, a backdoor in the server software was detected that allows execution of PHP code by an attacker.
- "OpenX Sells Open Source Ad Serving Product". 2013-09-13.
- Matt Asay (July 26, 2007). "Advertising the open-source way with Openads". cnet.
Openads is one of the most interesting open-source projects/companies on the planet. Period. It's an open-source ad server. Like DoubleClick without the lock-in or fees. In other words, it's open source--100 percent GPLv2. I guess it should be no surprise that the world's most popular ad server, powering Web 2.0 business models, is open source, just as the LAMP stack is the technological basis for Web 2.0 sites/services. I've been following Openads since May, when my friend Bryce Roberts indicated that he was considering investing in the company. (And so he/O'Reilly Alpha Tech Ventures did, along with Index Ventures, Mangrove Capital Partner and First Capital in a $5 million Series A round of funding, as Tim O'Reilly reports.)
- "Index of /OpenX-releases/OpenX-2.4". Matteo Beccati. Retrieved 2012-07-21.
- "Achtung: Anzeigen-Server OpenX enthält eine Hintertür" [Warning: Ad Server OpenX contains a backdoor] (in German). Germany: Heise Security. August 6, 2013.
Die aktuelle Version der Anzeigen-Server-Software OpenX enthält eine Hintertür, über die ein Angreifer beliebigen PHP-Code in den Server einschleusen und ausführen kann. Der bisher unbekannte Hintertür-Code findet sich im Download-Paket der aktuellen Version OpenX 2.10 und wird akut für Angriffe genutzt. ... Das OpenX-Security-Team hat bestätigt, dass es die betroffenen Dateien vom Server entfernt hat und an einem offiziellen Advisory arbeite. [The current version of OpenX Ad Server software has a backdoor through which an attacker can inject and execute arbitrary PHP code in the server. The previously unknown backdoor code can be found in the download package of the current version OpenX 2.10 and is used for acute attacks. ... The OpenX security team has confirmed that it has removed the affected files from the server and working on an official advisory.]