Check this news out sometimes back, from WordPress site.
It says :
"If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.
This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.
It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file............."
This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.
It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file............."
This is really bad, so those who are running their blog on WordPress 2.1.1, upgrade immediately and do a full overwrite of your old files, especially those in wp-includes.
"If you are a web host or network administrator, block access to “theme.php” and “feed.php”, and any query string with “ix=” or “iz=” in it. If you’re a customer at a web host, you may want to send them a note to let them know about this release and the above information."
2 comments:
You are completely mistaken.. It is perfectly safe. As a matter of fact the Kernel level threads in the OS is wrongly interpreted as being the primeval cause of the forthcoming ones. You may want to chk it out.
But it talks of many servers which are running the Wordpress Blogging software.
The original sourcecode of the software itself was modified which was available for download.And now they have taken out the affected server for investigation.
So, many people who upgraded to the latest version(2.1.1) of Wordpress have unintentionally installed a trojan horse on their web server.
And this was undetected for some days.
Now Wordpress have released an upgrade version 2.1.2 which removes these codes.
Post a Comment