![]() |
WORDPRESS - trojan-virus
I have had alot of people contacting me recently about trojans and virii on their sites that show up mysteriously on all their pages..
The comman factor seems to be wordpress. I am not a wordpress user so i dont know whats up , but if you are running wordpress i suggest doing an update regardless and if you are having problems contact your host to have your server cleaned up.. p.s. just cause you got rid of it once doesnt mean its gone. Its likely hiding in the shadows waiting to reinstall itself.. p.s.s. i recently invented a very usefull tool for checking sites .. http://tools.webspacemania.com/proxy/ What this is is a "double anonymous" browser that will surf to any domain using a random proxy that then forwards the html to my server through the proxy then redisplay's the results to you. ( its also usefull to determine if your having network troubles connecting to a site ). Keep in mind it going through several proxies so it takes a bit of time , and sometime the proxies are dead so it will fail. Also keep in mind the images are redisplayed inlin in your browser , so while the page contents are completely anonymous , any images will be redisplayed inline through your browser so if you want to be ULTRA anonymous , turn off images in your browser first. The script will disable any javascript on the target page so you dont have to worry about trojans and such when checking a site.. When you testa site the proxy port and county of the proxy will be displayed in the upper left hand corner of any page you check |
|
bump 4 wordpress peeps
|
Giving this a try but I can't read the results page properly. The proxy info box covers part of the message. :) I can only see the last 5 letters of a word 'ently'
|
What is this trojan doing that people noticed a problem?
What version of WP was the common denominator? |
thanks for useful link and info. esp. for link - now it's in my "favorites"
|
I had some trojans on my servers earlier today. Perhaps they came from a wordpress... Had to upgrade. Thanks for the info!
|
Thanks for the info, I'll take a closer look at this.
|
bump again for WP crew!
|
Its a voulnerability in wordpress actually that among other things, allows people to install trojan on your system.
|
Quote:
|
hmm nothing on the WP site yet... any confirmation that it's actually a WP problem?
|
apparently jerzeemedia is familiar with the problem and solution
http://www.gofuckyourself.com/showth...oto=nextnewest |
Quote:
|
It has to be more than just a wordpress problem.
I had something that looked like the example fetishblog posted and the only script used is phpadsnew. Anyone know what it does? |
I will ask again . . . what version of Wordpress is this happening on?
|
yea we need more details
|
Quote:
|
bump....
|
someone mentioned it in another thread. im not familiar with the product because i dont use it .. ( im referring to the version number affected )
|
Quote:
I would be inclined to think it was a common plugin they were using rather that WP itself. :2 cents: |
There was a security update for Wordpress released a month or so ago, 2.02
|
|
just checked all of my wp blogs and nothing found. whew
|
Advisory ID : FrSIRT/ADV-2006-1992
CVE ID : GENERIC-MAP-NOMATCH Rated as : High Risk Remotely Exploitable : Yes Locally Exploitable : Yes Release Date : 2006-05-26 Technical Description A vulnerability has been identified in WordPress, which may be exploited by attackers to compromise a vulnerable web server. This flaw is due to input validation errors in the "wp-admin/profile.php" script that does not validate certain parameters before being written to PHP scripts in the "wp-content/cache/userlogins/" and "wp-content/cache/users/" directories, which could be exploited by malicious users to inject and execute arbitrary PHP code with the privileges of the web server. Note : An input validation error in the "vars.php" script when handling the "PC_REMOTE_ADDR" HTTP header could be exploited by attackers to spoof their IP addresses. Affected Products WordPress version 2.0.2 and prior Solution The FrSIRT is not aware of any official supplied patch for this issue. |
okay, thanks
|
I was a victim of this piece of this shit.
|
All times are GMT -7. The time now is 07:35 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123