![]() |
Exploit for Wordpress...
I was looking through my 404 Error logs and saw all these hits looking for these files. I think hackers are running a program to see if these files are on a server and then they use a know bug to take control of the server...
so watch out... adxmlrpc.php 81 - /xmlrpc.php 60 - /adserver/adxmlrpc.php 59 - /phpadsnew/adxmlrpc.php 58 - /phpads/adxmlrpc.php 58 - /phpAdsNew/adxmlrpc.php 58 - /forum/viewforum.php 56 - /Ads/adxmlrpc.php 55 - /ads/adxmlrpc.php 54 - /xmlrpc/xmlrpc.php 54 - /xmlsrv/xmlrpc.php 53 - /blog/xmlrpc.php 52 - /drupal/xmlrpc.php 49 - /community/xmlrpc.php 47 - /blogs/xmlrpc.php 42 - /blogs/xmlsrv/xmlrpc.php 41 - /forum/profile.php 40 - /blog/xmlsrv/xmlrpc.php 38 - /blogtest/xmlsrv/xmlrpc.php 37 - /b2/xmlsrv/xmlrpc.php 35 - /phpgroupware/xmlrpc.php 34 - /wordpress/xmlrpc.php 34 - |
This bug has been around since what? 2002?
|
yeah, at least.
You'll see people scanning for a lot of common directories and apps nowadays. |
Thats why its best to run custom scripts
|
Quote:
You should always keep up with the updates. |
Oh,
and btw this wasn't a wordpress bug rather an xmlrpc. bug which affected lots of software |
All times are GMT -7. The time now is 03:59 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc