security hole in wp-login.php and/or wp-atom.php??
-
I’m observing someone in Moldova using my box as a spam relay via WP.
I host multiple installations of WP online, and for the past week have been seeing large HTTP POST entries in the logs with a file attached. I then see an outgoing email from sendmail as “[email protected]” going to some email address with a SPAM message attached.
A quick iptables rule to block the offending IP address has stopped it, for now, but I am running the latest version of WP with few plugins (or none, one some sites) and appear to be seeing an exploit of the core WP install itself? I need a more permanent solution.
I’ve seen a few other posts here similar to this, but with no apparent resolution. I’m fairly confident I don’t have a tainted install.
Here’s an example of the logs: (Logs truncated and code modified for safety)
95.65.31.32 – – [15/Jun/2012:20:54:34 -0400] “POST /blog/ HTTP/1.1” 404 297 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.3) Geck$
95.65.31.32 – – [15/Jun/2012:20:54:34 -0400] “POST /blog/?s=google HTTP/1.1” 404 297 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.$
95.65.31.32 – – [15/Jun/2012:20:54:34 -0400] “POST /blog/wp-atom.php HTTP/1.1” 404 308 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.$
95.65.31.32 – – [15/Jun/2012:20:54:35 -0400] “POST /blog/wp-login.php HTTP/1.1” 404 309 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1$
95.65.31.32 – – [15/Jun/2012:20:54:35 -0400] “POST /blog/wp-login.php HTTP/1.1” 100 0 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8$
95.65.31.32 – – [15/Jun/2012:20:54:36 -0400] “file=QGV2YWwoZGVjcnlwdCgiMXFPbG5OcFpXc0dCdExTR2kxdWRtczJhV1pTUGJGYUdwTm5DbVpWeFdhVEdtS0dseWxOeGJEdUp4Nl$
95.65.31.32 – – [15/Jun/2012:20:55:24 -0400] “POST / HTTP/1.1” 200 32 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.3) Gecko/20070309 $
95.65.31.32 – – [15/Jun/2012:20:55:24 -0400] “POST / HTTP/1.1” 100 0 “” “Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.3) Gecko/20070309 F$
95.65.31.32 – – [15/Jun/2012:20:55:24 -0400] “file=QGV2YWwoZGVjcnlwdCgicmFHc25xZGZWTUcyZ0xXSGxGeWV6cVNZWUpaY2NsQ0cyYVhEbXA1eVd0aWRscWlubDFscmJIQlZ5S1$
74.68.115.211 – – [-] “” ESMTP 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “EHLO myhost.myhost.com” – 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “MAIL From:<[email protected]>” 2.1.0 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “RCPT To:<[email protected]>” 2.1.5 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “DATA” End 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “Received: from myhost.myhost.com (localhost.localdomain [127.0.0.1])” 2.0.0 0 “” “”
74.68.115.211 – – [15/Jun/2012:20:55:26 -0400] “QUIT” 2.0.0 0 “” “”
- The topic ‘security hole in wp-login.php and/or wp-atom.php??’ is closed to new replies.