![]() |
Free Wordpress EXPLOIT remove utility here
Well my wordpress blogs were infected by some sort of exploit that allows hacker write files to my server and redirect traffic. It's really recommend to check your server for this shit+ upgrade to WP 2.51 asp! Here is handy tool I made to detect infected files + mysql database rows and remove this shit.
1) download tool here: http://64.15.156.39/remove_exploit.zip 2) download remove_exploit.zip -> unzip -> upload to your server 3) edit remove_exploit.php configuration part 4) login to your server via ssh 5) chdir to location where remove_exploit.php is located 5) run the tool: php remove_exploit.php :thumbsup notice: you must be logged as user who has rights to the files ('root' will work for sure) WARNING: USE THIS TOOL ON YOUR OWN RISK :2 cents: |
Liar!!!!!!!!!!!!!
|
Rrrrrrrrrrrrrrrrriiiiiiight........
|
Quote:
|
that link is broken, try this one instead
correct link |
|
Quote:
:1orglaugh |
for 110% paranoids is tool here:
Quote:
|
Exploit described here: http://wordpress.org/support/topic/169246
|
Great tool, running it now, thanks ilbb
|
If you are not sure about the script, you can remove 'unlink' commands to be 100% safe. Tool will then report if infected files were found.
|
well intended but pretty useless. If your box has been compromised there's only 1 thing to do: wipe and reinstall.
|
hackers suck
|
anyone have a better solution?
|
Nice catch.
Do you have any idea how you caught it ? |
And by caught it I mean, how you came to be infected.
|
trying to find out. was using the latest version of wp - when outdated versions were thought to be the culprit.
|
it's only on one of my smaller virtual hosts - so that may be the problem.
|
The big concern is if wp is inherently vulnerable, through some mysql injection or xss issue maybe.
|
Quote:
Upgrade your current version with the newest one. |
Quote:
|
disabling plugins seems to work ... on some of my blogs anyway.
|
Quote:
|
I've spent hours poring over this matter, and I have to my satisfaction resolved that
1. The point of infection is template/widget installation. 2. The version number has no bearing. You can get it just as well on 251. 3. It's not an inherent flaw in the wp php/mysql code. |
Quote:
|
It's not really a vulnerability per se.
Upon installing a new template, you grant code in there same rights as the wp package. An infected template then alters the p_footer() hook, wp_head() hook or both, ads some entries in a bogus wp_options entrace in the options table, and voila. You're infected. Moral is, never install code you haven't read. Don't be shy to crack "protected" stuff, especially if it's widgets, templates and the like. |
Quote:
|
Actually, what I say is, encrypted code should never be run. Decrypt, read, consider, install. DRCI.
If you don't know how to crack your wp template, I've just explained it in my blog. |
Quote:
|
Which reasoning explains why blackhat seo or nigerian scams don't exist. :)
|
im 100% against any themes that contain encrypted elements.
|
Quote:
|
| All times are GMT -7. The time now is 08:58 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2026, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123