Monday, 15 April 2013

Wordpress Twenty Eleven searchform.php vulnerability -



Wordpress Twenty Eleven searchform.php vulnerability -

my wordpress 20 11 searchform.php got hacked , created evil eval(base64_decode("hi have hacked site. haha")) found out nginx access log, found script executing via http protocol, set exit @ first line stopped script generating mass spam mails server.

my question how can happen initially? did hacker posted post or variables via form in searchform.php knowing @ stage executed eval() function included fopen , fwrite part of string?

if so, eval() located , how processed?

my searchform.php got rewritten

any ideas guys?

the lastly , updated version of theme twentytwelve : http://wordpress.org/extend/themes/twentytwelve

about vulnerability of website, authorizations of folders or have set in 777?

check link : http://www.orangecopper.com/blog/recommended-file-and-folder-permissions-for-your-wordpress-blog-installation/

php wordpress eval

No comments:

Post a Comment