Arbitrary File Upload Vulnerability / Exploit?
-
Hello, folks.
Here’s something from a total beginner with WordPress and no guru with coding and programming:I’ve just installed WordPress 2.7.1 locally, based on a Wamp Server install in WinXp. Playing around in the settings, I noticed the following message in the Dashboard, under Incoming Links:
“Buyacorp linked here saying, ” Exploit https://localhost/wp/?attachment_id=49 S …””
The word “saying” was a link (as I formated it above). The “https://localhost…” was plane text. Buyacorp, bolded. “wp” is the name of the folder where I installed WordPress locally.
I visited the link under “saying” and it’s spanish, which I don’t speak. I googled a bit and came up with this. Here it states, the bug was fixed with the changeset 5765 but I quess it was not.
I quickly deconnected the Wamp Server. ??
Any suggestions? Any fixes?
Many thanks.
- The topic ‘Arbitrary File Upload Vulnerability / Exploit?’ is closed to new replies.