{"id":700,"date":"2007-03-04T11:41:02","date_gmt":"2007-03-04T19:41:02","guid":{"rendered":"\/?p=700"},"modified":"2007-03-04T11:43:35","modified_gmt":"2007-03-04T19:43:35","slug":"wordpress-211-dangerous-upgrade-to-212","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=700","title":{"rendered":"WordPress 2.1.1 dangerous, Upgrade to 2.1.2"},"content":{"rendered":"<p>Any product&nbsp;that is&nbsp;really successful is going to be attacked.&nbsp; Over time the attacks will become progressively more sophisticated.&nbsp; Given how popular &#8211; and how good &#8211; WordPress is, it doesn&#39;t surprise me that it&nbsp;has attracted enough attention that someone eventually broke through.&nbsp;<\/p>\n<p>Guess what?&nbsp; I&#39;m running 2.1.1 in my test environment.&nbsp; Good thing I haven&#39;t flicked the switch.&nbsp; Anyway, <a href=\"http:\/\/wordpress.org\/development\/2007\/03\/upgrade-212\/\">here&#39;s the scoop<\/a> as explained by WordPress:<\/p>\n<blockquote><p>Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.<\/p>\n<p>Longer explanation: This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.<\/p>\n<p><span id=\"more-199\" \/><\/p>\n<p>It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.<\/p>\n<p>This is the kind of thing you pray never happens, but it did and now we\u00e2\u20ac\u2122re dealing with it as best we can. Although not all downloads of 2.1.1 were affected, we\u00e2\u20ac\u2122re declaring the entire version dangerous and have released a <a href=\"http:\/\/wordpress.org\/download\/\"><strong><font color=\"#003366\">new version 2.1.2<\/font><\/strong><\/a> that includes minor updates and entirely verified files. We are also taking lots of measures to ensure something like this can\u00e2\u20ac\u2122t happen again, not the least of which is minutely external verification of the download package so we\u00e2\u20ac\u2122ll know immediately if something goes wrong for any reason.<\/p>\n<p>Finally, we reset passwords for a number of users with SVN and other access, so you may need to <a href=\"http:\/\/wordpress.org\/support\/\"><strong><font color=\"#003366\">reset your password on the forums<\/font><\/strong><\/a> before you can login again. (More <a href=\"http:\/\/wordpress.org\/development\/2007\/03\/upgrade-212\/\">here<\/a>&#8230;)<\/p><\/blockquote>\n<p>Am I ever relieved that I&#39;m using&nbsp;Project Pamela&#39;s InfoCard plugin in the new environment!&nbsp; I haven&#39;t written about it yet, since I&#39;ve been evaluating the beta.&nbsp; But&nbsp;thanks to Project Pamela, I will just have to download 2.1.2, and change&nbsp;one line in one&nbsp;WordPress file to get InfoCard login&nbsp;working with it.&nbsp; Let&#39;s drink a toast to proper factoring!&nbsp; I&#39;ll be writing about this amazing plugin soon.<\/p>\n<p>By the way,&nbsp;I have good news for the old-fashioned.&nbsp; I&#39;ll be able to turn on username \/ password&nbsp;for comments again,&nbsp;since version 2.1.2 gets over the&nbsp;registration vulnerabilities in my current version.&nbsp;<\/p>\n<p>The whole episode brings up the interesting question of how to secure a widely distributed software project.&nbsp; The more desirable you are as a target, the better the tools you need.&nbsp; One day I hope to talk to the WordPress folks about incorporating InfoCards into their development process.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cracker gained user-level access to one of the servers that powers wordpress.org, and used that access to modify a download file&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12,6,13,15],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/700"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=700"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/700\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}