My blog - HACKED - then SPAMMED (every post). Hosting company response inside

by jguy1
52 replies
I noticed a few of my blogs all hosted on the same server were getting spammed with links. The spammer would place the links within every blog post on my blog. I contacted my hosting company and this is what I got in response.

I'd like to get input from any WF members please...

__________________________________
Text below is what I received from hosting company:
__________________________________
Hello,

The reason causing the issue is The do_trackbacks() function in wp-includes/comment.php does not properly escape the input that comes from the user, allowing a remote user with publish_posts and edit_published_posts capabilities to execute an arbitrary SELECT SQL query, which can lead to disclosure of any information stored in the WordPress database.

Unfortunately the bug still exist in the most stable version of the wordpress. They have not came with a patch for this bug.

And let me clarify that this has nothing to do with the server security settings. neither this can be prevent with any security feature in server, because its an application abuse due to the bug in WordPress.

Many of the users are reporting this issue in the intenet and some open source have claimed that they have found a patch for this, but we can't assure whether it works or create more security issues because they are not from authenticated source.

You can refer this link WordPress: Information Disclosure via SQL Injection Attack « WordPress « Ars Longa, Vita Brevis where they have provide a patch for this, but let me clarify that we wont be responsible for this patch. Its not from an authenticated source.


If you still see any link or injection, just run this querry in the phpmyadmin which will be removing the link
================================================== ============================================

UPDATE wp_posts SET `post_content`= REPLACE (`post_content`, 'injected string', '')

================================================== ===============================================

In the above query replace the "injected string " with the string that you want to remove from your domain.

eg:- UPDATE wp_posts SET `post_content`= REPLACE (`post_content`, '<a href="SPAM LINK">westernunion</a>', '')


Also when you install a new plugin or theme to your wordpress, please make sure it is not vulnerable. Its better not to install any plugins form unauthenticated source.
#blogs #company #hosting #spammed
  • Profile picture of the author shaunyb1
    For a non-techie, thats gone right over my head. I guess its hard to keep up with spammers, just keep doing what you can, muddling through, making backups daily and keep your eys open the game

    Hope your site is fixed soon.
    {{ DiscussionBoard.errors[4069199].message }}
  • Profile picture of the author Willie Murray
    I'll touch on this slightly, first off did you have a backup of your blog? If so revert to a good backup and restore....

    The hosting company are quite right in what they are saying, this is a vunrability in WordPress that has been exploited, and reading between the lines there's not patch as yet. When sites are hacked more often or not it's from opportunists and a one off...

    I would urge anyone if you value your website, blog etc make sure you take good regular backups, it's not the responsibility of your hosting company...
    {{ DiscussionBoard.errors[4069215].message }}
    • Profile picture of the author BizBoost
      Originally Posted by william1872 View Post

      I'll touch on this slightly, first off did you have a backup of your blog? If so revert to a good backup and restore....

      The hosting company are quite right in what they are saying, this is a vunrability in WordPress that has been exploited, and reading between the lines there's not patch as yet. When sites are hacked more often or not it's from opportunists and a one off...

      I would urge anyone if you value your website, blog etc make sure you take good regular backups, it's not the responsibility of your hosting company...
      You're kidding, right? Every WP blog out there is vulnerable to this? I can't believe the WP community would just let a security hole like this go unattended.
      {{ DiscussionBoard.errors[4069253].message }}
      • Profile picture of the author Jake Gray
        Originally Posted by BizBoost View Post

        You're kidding, right? Every WP blog out there is vulnerable to this? I can't believe the WP community would just let a security hole like this go unattended.

        Nah, not 'every'.

        Sure you have some people out
        there with trigger fingers willing
        to put hundreds of plugins on a
        single blog.

        Be sure to only use plugins that
        you need. Also, go ahead and research
        before you put some plugin on your
        site. Come on now, it's basic security
        measures.
        {{ DiscussionBoard.errors[4069288].message }}
      • Profile picture of the author jguy1
        Thanks everyone for your input. I backup all of my sites so this issue was an easy one to fix.

        It's strange how the only sites that got the spamming were all hosted on the same IP. It's as though they did it to all wp blogs on the IP server.

        I wasn't sure why he mentioned plugins at the end of his explanation. Was the spamming possible because of a plugin I'm using? Or did he just mention "when you install a new plugin or theme to your wordpress, please make sure it is not vulnerable." as sort of a side note...

        If this loophole wasn't due to a plugin I'm using then I can see why...

        Originally Posted by BizBoost View Post

        You're kidding, right? Every WP blog out there is vulnerable to this? I can't believe the WP community would just let a security hole like this go unattended.
        ....is shocked about this. Because - it would mean it's a loophole in the WP software..
        {{ DiscussionBoard.errors[4069858].message }}
        • Profile picture of the author Yoong
          Hi there,

          agree with Alan.

          Use Akismet

          Everytime I log in to WP - it tells me it blocked spam.

          YAY
          {{ DiscussionBoard.errors[4071168].message }}
  • Profile picture of the author Willie Murray
    I'm trying to see if I can find anything official on the WP site, but it looks like an old article Dec 2010.

    Bear in mind there's vunrabilities in anything that's been programmed, it's done by humans after all... Advice would be

    - Use minimal plugins, athorized sources only
    - Backup frquently
    {{ DiscussionBoard.errors[4069392].message }}
  • Profile picture of the author dean3265
    Good points. Now I just need to figure out how to do backups. Can anyone point me in the right direction!
    {{ DiscussionBoard.errors[4069432].message }}
  • Profile picture of the author weblink29
    If I'm reading that correctly they are telling you that it was caused by an SQL Injection Attack. Google: SQL Injection Attack

    Here's a Wiki:
    en.wikipedia.org/wiki/SQL_injection

    There isn't much a non tech can do to prevent those types of attacks.
    Signature

    Nothing to see here folks.....move along.

    {{ DiscussionBoard.errors[4069449].message }}
  • Profile picture of the author brunom
    This is scary news for all Wordpress users.
    Signature
    1500 Backlinks For Youtube Videos

    {{ DiscussionBoard.errors[4069454].message }}
    • Profile picture of the author Willie Murray
      Originally Posted by brunom View Post

      This is scary news for all Wordpress users.
      WP for my money is still the best on the market Open Source Solution for blogs
      {{ DiscussionBoard.errors[4069628].message }}
      • Profile picture of the author Alan Ashwood
        Sorry, but all that stuff was too techie for me.

        I don't know if I'm telling granny how to suck eggs, but I always run the Akismet plugin on my WP sites.

        So far, it has blocked every spam comment coming in, and it learns as it goes on.

        This may help someone out there

        Cheers

        Alan

        .
        Signature
        Now where did I put that pencil?

        Time for a cuppa.
        {{ DiscussionBoard.errors[4069851].message }}
  • Profile picture of the author weblink29
    I believe any website that uses SQL Databaes is vulnurable to SQL Injection Attacks - not just wordpress.
    Signature

    Nothing to see here folks.....move along.

    {{ DiscussionBoard.errors[4069857].message }}
  • Profile picture of the author seobro
    OK so this is one reason why I try not to use word press anymore. There are many. Actually, my primary reason is MYSQL is a resource pig. That means if you start getting traffic you can get kicked out by your hosting service. Yeah, that is my main reason.
    {{ DiscussionBoard.errors[4071242].message }}
    • Profile picture of the author Ben Armstrong
      Yeah it's generally wordpress.

      I went through the same thing and had 2 of my sites hijacked (the only 2 I had at the time) so I assumed it was more likely the hosting company at fault but it was wordpress.

      Since then I've

      - Changed all my usernames to something long and unique.
      - Changed my passwords to 12 highly secured letters/numbers which i record in a password protected spreadsheet. I never tell firefox to remember the passwords for me.
      - I use a plugin that automatically backs up the content on my site and emails it to me once a week.
      - I regularly update both wordpress and all my plugins on each site.
      - Every couple of weeks or whenever I make major changes to a site I do a full backup through the cpanel

      Since then I haven't had an issue.
      Signature

      {{ DiscussionBoard.errors[4071309].message }}
      • Profile picture of the author jguy1
        Originally Posted by Ben Armstrong View Post

        Yeah it's generally wordpress.

        I went through the same thing and had 2 of my sites hijacked (the only 2 I had at the time) so I assumed it was more likely the hosting company at fault but it was wordpress.

        Since then I've

        - Changed all my usernames to something long and unique.
        - Changed my passwords to 12 highly secured letters/numbers which i record in a password protected spreadsheet. I never tell firefox to remember the passwords for me.
        - I use a plugin that automatically backs up the content on my site and emails it to me once a week.
        - I regularly update both wordpress and all my plugins on each site.
        - Every couple of weeks or whenever I make major changes to a site I do a full backup through the cpanel

        Since then I haven't had an issue.
        It's a shame WP has this open loophole that is so well known. I hope it gets an official patch soon. I still believe that WP is the best blog platform. I've been in IM for 2 years and this has only happened twice...to the same blogs...I do the exact same stuff you've mentioned and therefore this is a very easy fix. Thanks Ben..good stuff.

        Originally Posted by Yoong View Post

        Hi there,

        agree with Alan.

        Use Akismet

        Everytime I log in to WP - it tells me it blocked spam.

        YAY
        The issue I brought up is not a matter of my blogs getting spammed by blog comments usually from automated software. It's a matter of the spammer actually placing blue underlined links within every post of my blog. These links are spam keyword phrases that link to their sites.

        I've found Akismet to be good for blog comment spam though.
        {{ DiscussionBoard.errors[4071463].message }}
      • Profile picture of the author ExRat
        Hi jguy1,

        Was the spamming possible because of a plugin I'm using?
        The reason causing the issue is The do_trackbacks() function in wp-includes/comment.php does not properly escape the input that comes from the user, allowing a remote user with publish_posts and edit_published_posts capabilities to execute an arbitrary SELECT SQL query, which can lead to disclosure of any information stored in the WordPress database.
        Do you have any plugins related to trackbacks/commenting?

        Have you got it set up to allow any site users/anyone else to publish posts?
        Signature


        Roger Davis

        {{ DiscussionBoard.errors[4071555].message }}
        • Profile picture of the author jguy1
          Originally Posted by ExRat View Post

          Hi jguy1,

          Do you have any plugins related to trackbacks/commenting?

          Have you got it set up to allow any site users/anyone else to publish posts?
          Hi ExRat, I looked over the plugins and the only one I'm concerned about is "exit rescue" which is given away for free here in the WF.

          When someone goes to leave a comment and clicks "submit" the exit popup is triggered (which I don't want it to) but I don't know how to fix that. I'll have to contact the plugins creator.

          Could this be what is creating the opportunity for the spam?

          also..i'm not familiar with "trackbacks" so I don't know how to check and see how any plugins I'm using could be the issue.

          Here is the list of plugins I'm using...

          akismet
          cbnet ping optimizer
          drop cap first character
          exit rescue
          fast secure contact form
          google analyticator
          google xml sitemaps
          login lockdown
          max blog press ninja affiliate
          seo power
          seo pressor
          simple captcha
          simple facebook like widget
          sociable for WP 3.0
          thesis openhook
          traffic gettign seo plugin TM 2.0
          vstats
          wordpress database backup

          what do you think?
          {{ DiscussionBoard.errors[4073498].message }}
          • Profile picture of the author ExRat
            Hi jguy1,

            When someone goes to leave a comment and clicks "submit" the exit popup is triggered (which I don't want it to) but I don't know how to fix that.
            Turn the plugin off or delete it. That should solve that problem.

            Get rid of any plugins you don't absolutely need.

            For example, I use one SEO plugin - allinone SEO.

            You have quite a few.

            What about the other issue -

            allowing a remote user with publish_posts and edit_published_posts capabilities to execute an arbitrary SELECT SQL query, which can lead to disclosure of any information stored in the WordPress database.
            According to what they are saying, this problem can only be exploited by someone with the capabilities to publish or edit posts.

            Have you allowed anyone else this capability, or are you the only user registered in the blog admin?
            Signature


            Roger Davis

            {{ DiscussionBoard.errors[4073594].message }}
            • Profile picture of the author jguy1
              Originally Posted by ExRat View Post

              Hi jguy1,



              Turn the plugin off or delete it. That should solve that problem.

              Get rid of any plugins you don't absolutely need.

              For example, I use one SEO plugin - allinone SEO.

              You have quite a few.

              What about the other issue -



              According to what they are saying, this problem can only be exploited by someone with the capabilities to publish or edit posts.

              Have you allowed anyone else this capability, or are you the only user registered in the blog admin?
              No, I haven't. Nobody has access to publish or edit posts except me. I will delete the exit plugin and see if it ever happens again.
              {{ DiscussionBoard.errors[4075751].message }}
              • Profile picture of the author jguy1
                Originally Posted by SteveJohnson View Post

                First things first: you weren't 'spammed', your server space was hacked. Big difference. Exactly how it was done is up in the air at the moment.

                Second, your hosting provider is sending you on a snipe hunt. The ONLY way that their explanation would work is that the trackback is from another blog owner who is an author (or editor or administrator) on your blog. If that is possible, then maybe you should be looking in that direction. If, on the other hand, you are the only admin/editor/author on your blog, you can write back to your hosting provider and tell them they are FOS (full of s&*t).

                Third, to all of you who keep climbing on the "WordPress is vulnerable, the sky is falling!!" bandwagon, get back off and save your breath.

                The 'exploit' described is very limited in scope and very complicated to pull off (did any of you even READ the post about it, and understand it?), and can't be used to add text to posts (which is what happened to the OP).

                Without thorough investigation, there's no telling how your site(s) were broken into - but I can almost guarantee you it wasn't because of what the hosting company said it was.
                SteveJohnson, I've been thinking the same thing. I have two hosting accounts. they are two separate companies. The only sites that got spammed were the ones on the one hosting account. ALL of my sites use the same plugins. Like i said earlier, no one has access in any way to my wp blogs. I would think..that if it's a plugin issue wouldn't some of my other sites get spammed? I'm leaning towards their server getting hacked also.

                Originally Posted by NicSennen View Post

                I had exactly the same thing happen with all the wordpress blogs on one of my hostgator accounts. I was told that it was a weakness in FileZilla that enabled the hackers to get my password. Hostgator cleaned up all the sites for me - but they did miss some files in each blog called "Silence is Golden".

                Once my sites were clean I have installed the plugin Wordpress Firewall 2 on all my sites (this is a bit of a pain as you need to disable it every time you want to make changes to the blog). I also upped the security level of my password, change it at least once a week and change it again immediately after I use FileZilla. No problem at all since.
                I haven't updated filezilla recently. I will now definitely update it. although, I have been logging into all of my sites through this older version of filezilla and like I said, the only sites that got spammed were the ones on the single hosting account...so this leads me to think that it isn't filezilla for me..but I will update it after you've said that. thanks. also, I'll check out firewall 2.

                anyone know a free website that allows me to see all other websites on the same IP address that my site/s are on? I could check to see if it has happened to other sites also...this would be strong evidence to suggest it's the server.

                also, anyone know an FTP software that is known for secure file transfer?
                {{ DiscussionBoard.errors[4075868].message }}
                • Profile picture of the author MisterE
                  Originally Posted by jguy1 View Post


                  anyone know a free website that allows me to see all other websites on the same IP address that my site/s are on? I could check to see if it has happened to other sites also...this would be strong evidence to suggest it's the server.

                  Jguy1,

                  Here you go.

                  Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server
                  Signature

                  "Procrastination is like a credit card: it's a lot of fun until you get the bill" Christopher Parker

                  {{ DiscussionBoard.errors[4124967].message }}
  • Profile picture of the author Rammesh
    It's really scary news to me, I am running almost all my sites on wordpress platform but I do backup every week once and installed plugin only from genuine source. Thank you to alert us about this.
    {{ DiscussionBoard.errors[4071894].message }}
  • Profile picture of the author Archon
    When I built my first WP site it got hacked a few times, utterly painful. On all subsequent blogs I use Login Lockdown, Secure Press, Wordpress Firewall Plugins. Since then no attacks. I also use a back up plugin
    {{ DiscussionBoard.errors[4074046].message }}
    • Profile picture of the author mediac
      Dude, thanks for the recommended plugins, I am now using them.
      {{ DiscussionBoard.errors[4130114].message }}
  • Profile picture of the author SteveJohnson
    First things first: you weren't 'spammed', your server space was hacked. Big difference. Exactly how it was done is up in the air at the moment.

    Second, your hosting provider is sending you on a snipe hunt. The ONLY way that their explanation would work is that the trackback is from another blog owner who is an author (or editor or administrator) on your blog. If that is possible, then maybe you should be looking in that direction. If, on the other hand, you are the only admin/editor/author on your blog, you can write back to your hosting provider and tell them they are FOS (full of s&*t).

    Third, to all of you who keep climbing on the "WordPress is vulnerable, the sky is falling!!" bandwagon, get back off and save your breath.

    The 'exploit' described is very limited in scope and very complicated to pull off (did any of you even READ the post about it, and understand it?), and can't be used to add text to posts (which is what happened to the OP).

    Without thorough investigation, there's no telling how your site(s) were broken into - but I can almost guarantee you it wasn't because of what the hosting company said it was.
    Signature

    The 2nd Amendment, 1789 - The Original Homeland Security.

    Gun control means never having to say, "I missed you."

    {{ DiscussionBoard.errors[4074577].message }}
  • Profile picture of the author rosetrees
    I've recently started installing the captcha plug-in - it's significantly reduced spam sign-ups and/or spam comments.
    {{ DiscussionBoard.errors[4074823].message }}
    • Profile picture of the author weblink29
      Originally Posted by rosetrees View Post

      I've recently started installing the captcha plug-in - it's significantly reduced spam sign-ups and/or spam comments.
      I don't think captcha security can prevent an sql injection attack from accessing your blog. I don't think they are coming through a web browser. I believe they are coming through ftp.
      Signature

      Nothing to see here folks.....move along.

      {{ DiscussionBoard.errors[4074859].message }}
      • Profile picture of the author IMStudentforlife
        As Yoong said use Akismet and also use something like Disqus or Intense debate. If you don't want to mess with the SQL database plug.

        You may get a reduction down from comments but they will be humans and not computer generated comments.

        weblink29: they couldn't come through your FTP only if you did not have a strong Alpha-Numerical password which should be changed every 6 months.

        Make sure your site is updated, all the plug-ins and especially Wordpress gets updated! This is the most common problem for site owners!

        I also agree with the hosting company about downloading from only a reputable source. There are only a few select plug-ins we use. Plus its always best to keep the plug-ins to a minimum as not to lag down your site.

        Hope this helps!
        Signature
        Old School SEO and IM, 1MediaZone

        Running low on inspiration?
        The Strangest Secret in the World
        {{ DiscussionBoard.errors[4074943].message }}
  • Profile picture of the author NicSennen
    I had exactly the same thing happen with all the wordpress blogs on one of my hostgator accounts. I was told that it was a weakness in FileZilla that enabled the hackers to get my password. Hostgator cleaned up all the sites for me - but they did miss some files in each blog called "Silence is Golden".

    Once my sites were clean I have installed the plugin Wordpress Firewall 2 on all my sites (this is a bit of a pain as you need to disable it every time you want to make changes to the blog). I also upped the security level of my password, change it at least once a week and change it again immediately after I use FileZilla. No problem at all since.
    Signature
    {{ DiscussionBoard.errors[4074948].message }}
  • Profile picture of the author ahmadbasyir
    Oh really, this sound scary... Is it can affect with a flip site?
    If a site had transfer to another server, then the spammers still can access it?

    Cheers,
    Basyir
    {{ DiscussionBoard.errors[4124123].message }}
  • Profile picture of the author Christian Little
    For those of you saying to use Akismet and other plugins, those won't work in this situation. Those plugins work when a comment is created, not when a post is editted (which is how this SQL injection hack is working).

    As the owner of a web hosting company, I'm inclined to say that while what they are telling you could be correct, I'm not sure if I entirely believe it is the problem in this case, there are so many ways a hacker can do what they are doing. For this hack to work, the hacker needs a valid username/password to your blog that has editting rights. So unless you have a really easy to guess username/password (you really didn't just use "admin" as your username did you???) it's unlikely this is the case.

    The main reason I don't believe this injection hack is the problem is that if you look at the link that was posted, first of all it's not on wordpress.org, it's on some russian blog. Secondly, it's dated 2010. I seriously doubt an injection hack would have persisted for the past 18 months.

    There's more than one way to do this type of thing, but it really does come down to the hacker getting access to your database. Whether it's through the injection hack that they mentioned, or maybe they figured out your username/password (brute force attacks on a server without a good firewall or defense system can easily give them access), or maybe they got access via the root user on the server somehow. Regardless of how they got access, the server you are on has been compromised.

    Here's what you need to do RIGHT NOW:

    1) Change ALL of your passwords. Don't use words in your passwords. Go to Strong Password Generator and generate a unique password for each and every login you have. Include symbols, and have it generate passwords that are at least 15 characters long. NEVER use the same password for more than one login.

    2) Change ALL of your usernames. I'm not kidding. Especially if you are using "admin" as your wordpress login name.

    3) Ask your hosting company to change your cPanel username (takes them about 5 seconds to do).

    4) Ask your hosting company what firewall they have. If they tell you they are just using ip_tables, then they are just asking for trouble. If they have something like CSF running and it's setup properly, then it's probably secure.

    5) Go into your File Manager in cPanel. Look at every single file. Yes, this is a pain. But if somebody gained access to your account, chances are they uploaded a backdoor file to ensure they can keep accessing your server. If you see a file that doesn't look like it belongs there, chmod it to 000 and then make sure your site still loads properly. If it does, then the file doesn't need to be there.

    5a) A really common backdoor is to create a file called "something.jpg" which looks like an image file, but they give it 755 or 777 permissions and it's actually a PHP script. So check your images.

    6) Go into your Wordpress and look at all the users you have created. If a hacker gained access to it, they may have created a user without you realizing it. Delete any users you do not recognize.

    7) Update your wordpress. If you are using anything below 3.1.0 a simple upgrade that takes only a few minutes should patch any old security holes on your blog.

    That won't necessarily stop them, but it should stop about 90% of the hackers that have compromised your account/server.
    {{ DiscussionBoard.errors[4124494].message }}
  • don't you think that if this was really a sql injection problem with word press that there would be hundreds of thousands of wp sites getting hit?

    don't you think that WP would have put out a fix by now?
    your hosting company is full of it. their servers got hacked is how this happened.

    also, how would anyone get into your server via ftp without knowing/guessing your login?
    there is no vulnerability in filezilla or other ftp program that allows this.

    if they get access to your system to find your login details, sure, but that is not a problem with filezilla/ftp.


    robert
    {{ DiscussionBoard.errors[4125250].message }}
  • Profile picture of the author Michael Mayo
    In your hosting control panel make sure that you DO NOT have the "Anonymous ftp" enabled.

    If you do then, Disable it!

    Good Luck,
    Have a Great Day!
    Michael
    {{ DiscussionBoard.errors[4125359].message }}
  • Profile picture of the author chimehost
    You should contact your web host and ask them about server security. I wonder if mod_security and a firewall is enabled on the server. Mod_security alone can help avoid some of the mysql injection attacks.
    Signature

    Our Brands - Website and VPS Hosting by PhotonVPS and Dedicated Hosting by Psychz

    {{ DiscussionBoard.errors[4127037].message }}
  • Profile picture of the author lemmyxuz
    Every time you make a blog site, just delete the "xmlrpc.php" in your wordpress platform files to disable trackbacks feature. Spammers can't penetrate you this way.
    {{ DiscussionBoard.errors[4131392].message }}
    • Profile picture of the author jguy1
      Originally Posted by lemmyxuz View Post

      Every time you make a blog site, just delete the "xmlrpc.php" in your wordpress platform files to disable trackbacks feature. Spammers can't penetrate you this way.
      I'd like to get more people talking about this...

      What is the benefit of having "trackbacks"? This is something I don't know. What are the negatives of disabling trackbacks?
      {{ DiscussionBoard.errors[4131489].message }}
  • spammers are not a security problem. they are certainly a problem but this is about hackers not spammers.

    robert
    {{ DiscussionBoard.errors[4133963].message }}
  • Profile picture of the author dagaul101
    Lets hope Wordpress can get a handle on this, and soon, it's inevitable that things like this happens, but usually they get solved before major damage is done
    {{ DiscussionBoard.errors[4134617].message }}
  • Profile picture of the author Paleochora
    Now...I am not suggesting anyone posting here has done this...

    But do not be tempted into installing premium plug-ins that may be offered free or nulled from less than scrupulous sources. This is a very common way of getting blogs messed up.
    {{ DiscussionBoard.errors[4135028].message }}
  • Profile picture of the author Andrea Wilson
    Quite alarming if you'll ask me. But I suppose you have a back-up of your website, right? This is the reason why we should always update when wordpress tells us to.

    Andrea
    {{ DiscussionBoard.errors[4135552].message }}
  • Profile picture of the author cripperz
    Wordpress have security holes from time to time due to their flexible features. But this should not stop you from using them. Off the plugins that you do not need and be aware of the plug-ins that you need.

    Backing up your files is never a responsibility of the hosting company. It is your responsibility to ensure that you have timely backups with the tools provided by your hosting company.

    Do check and test the plug-in first on your mirror site before putting the plugin on your production site =P
    {{ DiscussionBoard.errors[4139161].message }}
  • Profile picture of the author rite
    limiting the amount plugins on a site and running a security plugin like wp-secure is your best defense against this type of attack
    {{ DiscussionBoard.errors[4139261].message }}
  • Profile picture of the author webinsiders
    I would:

    a) Stay calm and not freak out

    If your host is telling the truth, then:

    b) Upgrade your Wordpress version to the latest version by going to http://www.yoursite.com/wp-admin/update-core.php

    c) Turn off trackbacks (which appear to be causing the security hole) by going to SETTINGS > DISCUSSION > and uncheck 'Allow link notifications from other blogs (pingbacks and trackbacks)' then save.

    If you need any further help please PM me! I'll be glad to help.
    {{ DiscussionBoard.errors[4139565].message }}
  • Profile picture of the author dagaul101
    Sorry to hear about this, the bigger the blogging platform, the more determined hackers are to vandalise it
    {{ DiscussionBoard.errors[4139668].message }}
  • Profile picture of the author webinsiders
    Wordpress has been the most secure platform I've ever used, so it's surprising that such a 'bug' would remain unnoticed or unpatched.

    What version of WP are you using btw?
    {{ DiscussionBoard.errors[4141010].message }}
    • Profile picture of the author SteveJohnson
      Originally Posted by chadfullerton View Post

      Wordpress has been the most secure platform I've ever used, so it's surprising that such a 'bug' would remain unnoticed or unpatched.

      What version of WP are you using btw?
      3 points:
      • It did NOT go 'unnoticed' or 'unpatched'. It was fixed immediately after it was discovered, Version 3.0.2 « WordPress Codex , and released the same day of the initial publication of the hacker blog post that described it: WordPress:
      • WP classified this as a 'moderate' security risk as to be able to make it work, the hacker had to have 'Author' status on the exploited site, and had to be well-versed in MySQL injection techniques
      • it is obvious that people do very little investigation before posting on threads like this as there is really nothing to talk about in terms of WP being 'vulnerable' - something minor was found, it was fixed, end of story

      The real issue should be the inaccurate response of the hosting company as outlined in the OP.
      Signature

      The 2nd Amendment, 1789 - The Original Homeland Security.

      Gun control means never having to say, "I missed you."

      {{ DiscussionBoard.errors[4141232].message }}

Trending Topics