A Ovest Di Paperino

Welcome to the dark side.
ARCHIVED

Wordpress: remote execution exploit

Cito da qui:

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.

Neanche una settimana fa commentavo riguardo un eposodio simile capitato a quelli di Etomite. Che devo pensare?

Technorati tags: ,