[wp-hackers] WP security breach-- may be my fault, may not be

Roy Schestowitz r at schestowitz.com
Wed May 10 13:53:52 GMT 2006


___/ On Wed 10 May 2006 05:29:11 BST, [ David Chait ] wrote : \___

> Eric A. Meyer wrote:
> |    I dunno.  That's why I brought it up here, just in case there was
> | a previously unknown vulnerability.
> and
> |    Unless of course whatever they're doing isn't solved by the latest
> | version.  I'm assuming that all this isn't an obvious example of a
> | widely known problem with the 1.5x series, though.


In  the  mean time, one safe(r) approach might be to chmod  600  edit.php
whenever you do not modify content. This will have future cracking attem-
pts  logged  (unlike   IP-based banishment) and  prevent your  site  from
being defaced.


> If you really feel that's the case, and there's been no evidence to the
> contrary, then I'd recommend we stop this thread, you remove the pastebin
> stuff, and contact the security list.  Just IMHO from other similar recent
> discussions where that was the end suggestion...


I  believe  it's  a  distribution  rather  than  a  list.  An  E-mail   to
security at wordpress.org will reach Matt, Ryan and the others, once there is
proof  to suggest a threat has become concrete. Possibilities to confute a
hole  as  it  stands: weak admin password;  code  modification  (including
plug-ins);   packet  sniffing/interception  that  led  to  content   being
injected.

Best wishes,

Roy

-- 
Roy S. Schestowitz, Ph.D. Candidate (Medical Biophysics)
http://Schestowitz.com  |  Open Prospects   ¦     PGP-Key: 0x74572E8E
  2:40pm  up 12 days 21:37,  8 users,  load average: 0.19, 0.30, 0.28
      http://iuron.com - knowledge engine, not a search engine



More information about the wp-hackers mailing list