WordPress 2.1.1 / C(rack)orrupted release files

In urma cu aproximativ 14 ore  au dat un anunt prin care avertizeaza ca versiunea wordpress 2.1.1 disponibila la download pe serverul lor in ultimile 3-4 zile are fisiere ce contin un exploit. Din cate spun ei cracker-ul ar fi fost o persoana cu access la serverul wordpress.org , acest lucru permitandu`i sa modifice doua fisiere. Irelevant acum cine a fost crackerul. Important este ca toti care au descarcat si instalat wp. 2.1.1 in ultimile zile sa-si faca .

Nu vreau sa ma gandesc cati bloggeri trebuie sa faca la noua versiune 2.1.2. 

If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.

….

If your blog is running 2.1.1, please upgrade immediately and do a full overwrite of your old files, especially those in wp-includes. Check out your friends blogs and if any of them are running 2.1.1 drop them a note and, if you can, pitch in and help them with the upgrade.

If you are a web host or network administrator, block access to “theme.php” and “feed.php”, and any query string with “ix=” or “iz=” in it. If you’re a customer at a web host, you may want to send them a note to let them know about this release and the above information.

Sursa :

 

WordPress 2.1.1 / C(rack)orrupted release files

About the author

Stealth

Pasionat de tot ce inseamna gadget si IT, scriu cu placere pe stealthsettings.com din 2006 si imi place sa descopar alaturi de voi lucruri noi despre calculatoare si sistemele de operare macOS, Linux, Windows, iOS si Android.

Leave a Comment