News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Smackdown Blog:
Rackspace Hacked Clients, Check Your Databases Wordpress "wp_optimize" Backdoor
June 16, 2010 @ 11:39:45

If you're a WordPress user and have an instance running on a Rackspace server, you should read this article to be sure you keep your site safe.

Just finished cleaning up a hacked client whose website is hosted on Rackspace Cloud hosting. I had discovered that there were a large number of people all on the same IP as my client a couple of weeks ago who all got hacked. [...] It looks like the culprit might have been a security hole in phpmyadmin. Hopefully this will turn out to be what was wrong, because Rackspace upgraded all of their installations of that package this past Saturday.

No matter the cause, there's a quick fix that can help protect your installation from the hack attempts making their way around. The problem was an injection directly into the wp_options table with the autoload turned on and a content field containing some PHP code. This code was executed each time the page loaded. They also include a bit of SQL you can run to check and see if there's any entries that might have made their way in.

0 comments voice your opinion now!
wordpress wpoptimize injection security backdoor


blog comments powered by Disqus

Similar Posts

SitePoint PHP Blog: Redirecting Old URLs in WordPress

Ben Ramsey\'s Blog: Peruser MPM for Apache

ServerGrove Blog: Security tools for PHP projects

BlogSecurity.net: Interview with Stefan Esser on WordPress

Zend Developer Zone: OSCON Day 2: Picking Up Steam


Community Events

Don't see your event here?
Let us know!


example symfony series community composer project programming podcast application api list yii2 introduction opinion part2 language interview php7 framework laravel

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework