[wp-hackers] WP security breach-- may be my fault, may not be
Eric A. Meyer
eric at meyerweb.com
Wed May 10 03:30:23 GMT 2006
At 5:42 AM +0100 5/9/06, Roy Schestowitz wrote:
>I hope you have added 207.42.135.122 to yours IP deny list. I know I have.
Not yet. I actually want them to try again, so I can see if it's
a password crack or something else. (I've changed the password.)
I'm willing to undertake the effort of cleaning up after another
successful attack if allowing it helps figure out exactly what
happened. So far, no posts have been modified since I cleaned up
after the last two attacks and changed my admin password.
Although if they cracked the admin password, I'd like to know how.
I haven't seen any apparent attempts to brute-force it, and I'm not
sure how it could have been swiped-- and why would someone bother in
the first place? The effort needed to crack a password on a single
blog just doesn't seem worth the payoff.
So here's what I have found, little though it may tell anyone:
http://meyerweb.pastebin.com/708792
That shows All of the instances where there were attempts to access
the WP admin area and the client was redirected to the login page. I
highlighted the two known breakins, but there's a third that wasn't a
breakin but interested me. I highlighted it too-- what drew my
attention was the "Show+Month" bit. So I searched for all instances
of that IP address and came up with:
http://meyerweb.pastebin.com/708795
So if that was a breakin attempt, it failed. I just find it
interesting that there's been more than one attempt to get in that
way. It might be the same person from multiple machines, of course.
I searched my access logs again for all "Show+Month" entries, but
they were all either the original breakins, this now one I show
above, or my own machines.
>There *may* be some backdoor in the handling of
>edit.php?m=MONTH&submit=Show+Month perhaps? I don't know what these
>arguments are intended to achieve. Maybe bad handling of exceptions?
I dunno. That's why I brought it up here, just in case there was
a previously unknown vulnerability.
>This can't do much harm /assuming/ you have not modified much of your code
>(I know Eric Meyer has "hacked WordPress like it was attacking his family").
Actually, not any more. I'm running 1.5 and all the 'hacking' is
now in theme files, or else via plugins I wrote for myself. The core
itself is largely or completely undisturbed. I did a test upgrade to
2.0 on my local server and there weren't any hiccups in terms of the
install running, so I suspect "completely", but it's been a long time
since I upgraded to 1.5 and so I might have forgotten a tweak or two.
>Time-wise, it might be worth going over the changelog for 1.5.3 and, based
>on the log, see if it fixes the problem at hand. It could return to attack
>via proxies and become detrimental. The only real solution is patching.
Unless of course whatever they're doing isn't solved by the latest
version. I'm assuming that all this isn't an obvious example of a
widely known problem with the 1.5x series, though.
--
Eric A. Meyer (eric at meyerweb.com)
Principal, Complex Spiral Consulting http://complexspiral.com/
"CSS: The Definitive Guide," "CSS2.0 Programmer's Reference,"
"Eric Meyer on CSS," and more http://meyerweb.com/eric/books/
More information about the wp-hackers
mailing list