GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Wordpress Attack Underway-Upgrade if you can (https://gfy.com/showthread.php?t=925934)

docputer 09-05-2009 08:39 AM

Wordpress Attack Underway-Upgrade if you can
 
If you?re running a self-hosted WordPress (WordPress) blog that isn?t up-to-date (version 2.8.4), you?re advised to upgrade immediately to the latest version of the software to avoid an ongoing attack. Users of WordPress.com hosted blogs are not affected.
This message came from Lorelle at Wordpress after it was discovered that a nasty attack is exploiting security holes in previous versions of the blogging software, creating a new ?hidden? Administrator account and getting right down to the database level. These attacks are said to be ?growing by the hour?. Lorelle writes:

There are two clues that your WordPress site has been attacked.

There are strange additions to the pretty permalinks, such as example.com/category/post-title/%&(%7B$%7Beval(base64_decode($_SERVER%5BHTTP_REFER ER%5D))%7D%7D|.+)&%/. The keywords are ?eval? and ?base64_decode.?

The second clue is that a ?back door? was created by a ?hidden? Administrator. Check your site users for ?Administrator (2)? or a name you do not recognize. You will probably be unable to access that account.

All users are advised to upgrade to the latest version of WP, while those already affected are in for a trying weekend: you?ll likely need to export your all your content with the built-in XML WordPress export, uninstall and reinstall WordPress and re-import the content. It?s a nasty attack that goes all the way into the database, so exporting the database will result in exporting the hacked code too.

For those unaffected: upgrade today.
http://mashable.com/2009/09/05/wordpress-attack/

Cyber Fucker 09-05-2009 08:48 AM

Thx for the info! Sounds like wordpress is having more and more security holes recently...

TheSenator 09-05-2009 08:52 AM

ok...I plugged up my site months ago....


Another layer of security is renaming your table prefix.

Use this tool to help you.
http://semperfiwebdesign.com/custom-...security-scan/

Killswitch - BANNED FOR LIFE 09-05-2009 08:53 AM

Wordpress is a pile of shit anyway.

Jdoughs 09-05-2009 08:57 AM

If you're running an old version you are just asking for it, this doesn't affect anyone who is up to date with updates.

Hotrocket 09-05-2009 10:36 AM

I'm pretty sure fris posted about this like 2 weeks ago...lol

Agent 488 09-05-2009 10:43 AM

i'm pretty sure it was another hack ... lol.

Quote:

Originally Posted by Hotrocket (Post 16281639)
I'm pretty sure fris posted about this like 2 weeks ago...lol


Scotty.T 09-05-2009 10:47 AM

Quote:

Originally Posted by Hotrocket (Post 16281639)
I'm pretty sure fris posted about this like 2 weeks ago...lol

I'm pretty sure fris' post about this 2 weeks ago was a different exploit.

ladida 09-05-2009 11:56 AM

Quote:

Originally Posted by docputer (Post 16281310)
The keywords are “eval” and “base64_decode.”

Those are just shell parameters that can be changed at any time. Wouldn't call those keywords for detection, rather the chars infront, which looks like they found a regexp and escaped from it (%&(%7B$%7B).

woj 09-05-2009 12:04 PM

these hacks happen all the time, nothing new


All times are GMT -7. The time now is 08:07 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc