[wp-hackers] xml-rpc threat ?

Podz podz at tamba2.org.uk
Mon Nov 7 15:06:17 GMT 2005


http://www.theregister.co.uk/2005/11/07/linux_worm/
http://isc.sans.org/diary.php?storyid=823

"xml-rpc for php is used in a large number of popular web applications
such as PostNuke, Drupal, b2evolution, Xoops, WordPress, PHPGroupWare
and TikiWiki. When exploited, this could compromise a vulnerable system.
Most of these packages should have xml-rpc for php vulnerability fixed
in the latest version. If you are still running an old version, you
should get it updated immediately."

I'm assuming it's fixed, but confirmation ahead of any forum posts would
be nice.

P.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 250 bytes
Desc: OpenPGP digital signature
Url : http://comox.textdrive.com/pipermail/wp-hackers/attachments/20051107/08ed127c/signature.pgp


More information about the wp-hackers mailing list