News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Smackdown Blog:
Rackspace Hacked Clients, Check Your Databases Wordpress "wp_optimize" Backdoor
June 16, 2010 @ 11:39:45

If you're a WordPress user and have an instance running on a Rackspace server, you should read this article to be sure you keep your site safe.

Just finished cleaning up a hacked client whose website is hosted on Rackspace Cloud hosting. I had discovered that there were a large number of people all on the same IP as my client a couple of weeks ago who all got hacked. [...] It looks like the culprit might have been a security hole in phpmyadmin. Hopefully this will turn out to be what was wrong, because Rackspace upgraded all of their installations of that package this past Saturday.

No matter the cause, there's a quick fix that can help protect your installation from the hack attempts making their way around. The problem was an injection directly into the wp_options table with the autoload turned on and a content field containing some PHP code. This code was executed each time the page loaded. They also include a bit of SQL you can run to check and see if there's any entries that might have made their way in.

0 comments voice your opinion now!
wordpress wpoptimize injection security backdoor


blog comments powered by Disqus

Similar Posts

Community News: SecurePHP Wiki

NETTUTS.com: Anatomy of a WordPress Plugin

Justin Silverton\'s Blog: PHP Security Mistakes - Part 2

John Cox\'s Blog: Security Blunders

Reddit.com: What everyone should know about strip_tags()


Community Events





Don't see your event here?
Let us know!


introduction version podcast composer symfony list series conference configure laravel voicesoftheelephpant extension unittest api community opinion install release language interview

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework