|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
#1 |
Oh no, I'm sweating like Roger Ebert
|
Virus Being Added to Blogs
This is the third time I've seen this on various blogs and CMS's in about a week. Someone is adding a nasty little java script right at the top of your meta area. I've seen it on a couple WP blogs and now a Joomla CMS site.
What they are attempting to load is the old download.trojan. |
![]() |
![]() |
![]() |
#2 |
Certified Nice Person
|
Does this mean that there is a security hole in WP and Joomla? Or perhaps the culprits are finding holes via other scripts on the same server?
![]()
__________________
Click here to purchase a bridge I'm selling. |
![]() |
![]() |
![]() |
#3 | |
Oh no, I'm sweating like Roger Ebert
|
Quote:
But the one common thread I have found is that they only seem to be affecting the default templates. |
|
![]() |
![]() |
![]() |
#4 |
Oh no, I'm sweating like Roger Ebert
|
This is the only additional info I have:
We've removed the javascript server side. This is not necessarily a Joomla exploit. It is definitely a php exploit that we are looking in to. |
![]() |
![]() |
![]() |
#5 |
The sun? That's the hottest place on Earth
|
which verision of wordpress? or does it seem to even matter?
|
![]() |
![]() |
![]() |
#6 | |
Oh no, I'm sweating like Roger Ebert
|
Quote:
|
|
![]() |
![]() |
![]() |
#7 |
Took the hint.
|
PHP exploits are pretty rare... what version of PHP is this involving?
Alex |
![]() |
![]() |
![]() |
#8 | |
Oh no, I'm sweating like Roger Ebert
|
Quote:
Anyway to answer your question its version 4.3.9 |
|
![]() |
![]() |
![]() |
#9 |
You tried your best and you failed miserably. The lesson is 'never try'
Join Date: Apr 2005
Posts: 164
|
Damn, this sucks big time.
Im using WP, but luckly I wasnt hijacked yet...
__________________
TripleX-Studios.com - Cheap, Fast Delivery and Convertable Gallery Designs! |
![]() |
![]() |
![]() |
#10 | |
a.k.a. Sparky
Join Date: Sep 2004
Location: West Palm Beach, FL, USA
Posts: 2,396
|
Quote:
However, I would still believe the exploit came through something like phpmyadmin, awstats or some other php script as some of the exploits on php itself require some pretty specific circumstances.
__________________
SnapReplay.com a different way to share photos - iPhone & Android |
|
![]() |
![]() |
![]() |
#11 |
Oh no, I'm sweating like Roger Ebert
|
Your definately much more knowledgable on this type of thing than I ever hope to be. All I can say is that when I checked my index.php file the javascript wasn't there. When rendered to my browser and viewed using view source, it over wrote the W3C document type statement.
What path it took to get there, I haven't a clue. |
![]() |
![]() |
![]() |
#12 |
Took the hint.
|
Walrus, the idea that something in PHP is changed is possible, but that doesn't make it an exploit of PHP... don't look at the result, the question is the door it came in with. It might not be in PHP either, it could be right in the apache webserver or other.
This sort of thing is about the illness, not just the symptoms. Alex |
![]() |
![]() |
![]() |
#13 |
Oh no, I'm sweating like Roger Ebert
|
Actually, I'm not calling it an exploit, the CS rep at my host did. I'm just trying to relay the information I get as I can. Post #4 I fucked up and should have made that more clear. The last three lines of the post are quoted from an e-mail and not me making assumptions.
|
![]() |
![]() |
![]() |
#14 |
a.k.a. Sparky
Join Date: Sep 2004
Location: West Palm Beach, FL, USA
Posts: 2,396
|
if the code isn't in your index.php, I would suspect a template got changed. If your host runs setuid (where the apache process runs as the owner rather than as nobody/www-data or an unprivileged account), any remote exploit would allow them to overwrite a number of files. It would be more difficult if they didn't run setuid.
you mentioned Joomla, are you running the latest patches for that? They had 5 or 6 exploitable bugs that were patched in December. So far, I haven't seen evidence of an issue on Wordpress 2.0.2 that we couldn't find exploited through other software running on that site. Any method that it occurred, its in your best interest to figure out how it was exploited.... because it will happen again.. and again... and again.
__________________
SnapReplay.com a different way to share photos - iPhone & Android |
![]() |
![]() |
![]() |
|
|