The Joomla! Forum ™





Post new topic Reply to topic  [ 10 posts ] 
Author Message
PostPosted: Sat Mar 03, 2007 12:59 am 
User avatar
Joomla! Ace
Joomla! Ace

Joined: Sat Aug 20, 2005 12:32 pm
Posts: 1114
Location: Weymouth, UK
Quote:
Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.

Longer explanation: This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.

This is the kind of thing you pray never happens, but it did and now we’re dealing with it as best we can. Although not all downloads of 2.1.1 were affected, we’re declaring the entire version dangerous and have released a new version 2.1.2 that includes minor updates and entirely verified files. We are also taking lots of measures to ensure something like this can’t happen again, not the least of which is minutely external verification of the download package so we’ll know immediately if something goes wrong for any reason.

Finally, we reset passwords for a number of users with SVN and other access, so you may need to reset your password on the forums before you can login again.
What You Can Do to Help

If your blog is running 2.1.1, please upgrade immediately and do a full overwrite of your old files, especially those in wp-includes. Check out your friends blogs and if any of them are running 2.1.1 drop them a note and, if you can, pitch in and help them with the upgrade.

If you are a web host or network administrator, block access to “theme.php” and “feed.php”, and any query string with “ix=” or “iz=” in it. If you’re a customer at a web host, you may want to send them a note to let them know about this release and the above information.

Thanks to Ryan, Barry, Donncha, Mark, Michael, and Dougal for working through the night to figure out and address this problem, and thanks to Ivan Fratric for reporting it in the first place.
Questions and Answers

Because of the highly unusual nature of this event and release, we’ve set up an email address 21securityfaq@wordpress.org that you can email questions to, and we’ll be updating this entry with more information throughout the day.

Is version 2.0 affected?

No downloads were altered except 2.1.1, so if you’ve downloaded any version of 2.0 you should be fine.

What if we update from SVN?

Nothing in the Subversion repository was touched, so if you upgrade and maintain your blog via SVN there is no chance you downloaded the corrupted release file.

_________________
Phil Taylor - Full Time Joomla/PHP Expert
Blue Flame IT Ltd.
-- http://myjoomla.com/ Joomla Security/Hack fix Auditing Service
-- http://www.phil-taylor.com/


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 7:16 am 
I've been banned!

Joined: Thu Jan 18, 2007 4:43 am
Posts: 151
wow... I guess that's why they invented WTF

funny though, apart from the version number, there is nothing on Wordpress.org that hints at the urgency implied by your post..

Quote:
The latest stable release of WordPress (Version 2.1.2) is available in two formats from the links to your right. If you have no idea what to do with this download, we recommend signing up with one of our web hosting partners that offers a one click install of WordPress or getting a free account on WordPress.com.


You would have thought they would have a posting on their own site?


and what is a "user" level access doing with access to the deployment folder?...

I guess that's the "Open" in Open Source? ;)


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 10:20 am 
User avatar
Joomla! Ace
Joomla! Ace

Joined: Sat Aug 20, 2005 12:32 pm
Posts: 1114
Location: Weymouth, UK
Quote:
there is nothing on Wordpress.org that hints at the urgency implied by your post..


Er? What! This is a copy and past from THEIR SITE!

See:
http://wordpress.org/development/2007/03/upgrade-212/

http://technorati.com/search/wordpress+dangerous

_________________
Phil Taylor - Full Time Joomla/PHP Expert
Blue Flame IT Ltd.
-- http://myjoomla.com/ Joomla Security/Hack fix Auditing Service
-- http://www.phil-taylor.com/


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 11:38 am 
I've been banned!

Joined: Thu Jan 18, 2007 4:43 am
Posts: 151
http://wordpress.org/development/2007/0 ... 212/  NOT EQUAL TO

http://wordpress.org/&nbsp; <--- where regular people go


1. Nobody can even GET to /development from the frontpage....

This means if you download it earlier and came back to the site, you wouldnt know anything....


Of course if the hacker had an externally host jpeg or ping, he would have the location of every one of the hacked setups :(


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 12:26 pm 
User avatar
Joomla! Master
Joomla! Master

Joined: Fri Aug 12, 2005 7:19 am
Posts: 10425
Location: Leeds, UK
It really cant be stressed how important an issue this is. Not just for wordpress users but for all users of downloaded software.

Even something liked pgp signed archives and md5sums wouldnt protect users from this scenario

_________________
"Exploited yesterday... Hacked tomorrow"
Blog http://brian.teeman.net/
Joomla Hidden Secrets http://hiddenjoomlasecrets.com/


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 4:26 pm 
User avatar
Joomla! Ace
Joomla! Ace

Joined: Sat Aug 20, 2005 12:32 pm
Posts: 1114
Location: Weymouth, UK
Quote:
Nobody can even GET to /development from the frontpage....


That is factually incorrect !

Simply go to the wordpress home page and click BLOG in the top menu.

Quote:
This means if you download it earlier and came back to the site, you wouldnt know anything....


Again incorrect - the Dashboard in Wordpress Admin when you login tells you the latest wordpress news - infact that is how I heard about it.

_________________
Phil Taylor - Full Time Joomla/PHP Expert
Blue Flame IT Ltd.
-- http://myjoomla.com/ Joomla Security/Hack fix Auditing Service
-- http://www.phil-taylor.com/


Top
 Profile  
 
PostPosted: Sat Mar 03, 2007 5:11 pm 
I've been banned!

Joined: Thu Jan 18, 2007 4:43 am
Posts: 151
OOOPS!

I stand corrected(sorta)

The information, while it isnt on the Front page or the Download page for that matter, IS prominently displayed on their BLOG page !
(and, since WordPress is a Blog, that is probably the best place to put that irrelevant nugget! :P)

That behavior is, as you know, not without precedent.

The August 2001 PDB ( Presidential Daily Briefing report), noted that OSAMA Bin LADEN was determined to attack inside the United States!

Alas, this information was also hidden on the BLOG page. :(  *

http://www.thesmokinggun.com/archive/0409041pdb1.html



The rest, as they say, is history.


Top
 Profile  
 
PostPosted: Mon Mar 19, 2007 7:09 pm 
User avatar
Joomla! Apprentice
Joomla! Apprentice

Joined: Sat May 06, 2006 8:55 pm
Posts: 12
Location: Texas - United States
Quote:
and you should upgrade all of your files to 2.1.2 immediately.



So, since I don't see this comp in the Extensions Directory...has the component been updated, for those of us who may be interested? 

Or do we install it and upgrade from within?

:pop

sylvia

_________________
http://www.[spam].com

Do not go where the path may lead, go instead where there is no path and leave a trail.  (Ralph Waldo Emerson)


Top
 Profile  
 
PostPosted: Mon Mar 19, 2007 7:51 pm 
User avatar
Joomla! Master
Joomla! Master

Joined: Fri Aug 12, 2005 7:19 am
Posts: 10425
Location: Leeds, UK
This post wasnt about a joomla component

_________________
"Exploited yesterday... Hacked tomorrow"
Blog http://brian.teeman.net/
Joomla Hidden Secrets http://hiddenjoomlasecrets.com/


Top
 Profile  
 
PostPosted: Mon Mar 19, 2007 7:56 pm 
User avatar
Joomla! Apprentice
Joomla! Apprentice

Joined: Sat May 06, 2006 8:55 pm
Posts: 12
Location: Texas - United States
Understood that from the OT...just thought I'd ask here as it seemed 'the beginning.'  Away with me then.....

sylvia

_________________
http://www.[spam].com

Do not go where the path may lead, go instead where there is no path and leave a trail.  (Ralph Waldo Emerson)


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 10 posts ] 



Who is online

Users browsing this forum: No registered users and 5 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Jump to:  
Powered by phpBB® Forum Software © phpBB Group