<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pressed Words &#187; Security</title>
	<atom:link href="http://pressedwords.com/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://pressedwords.com</link>
	<description>News and commentary about all things WordPress</description>
	<lastBuildDate>Thu, 11 Jun 2009 03:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Beware Upgrading to a Fake WordPress 2.6.4</title>
		<link>http://pressedwords.com/beware-trojan-wordpress/</link>
		<comments>http://pressedwords.com/beware-trojan-wordpress/#comments</comments>
		<pubDate>Fri, 07 Nov 2008 12:49:26 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Snoopy]]></category>
		<category><![CDATA[Trojan]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=121</guid>
		<description><![CDATA[The Register mentions an attack on WordPress blogs that tells users to upgrade to a bogus 2.6.4 version of WordPress. This attack seems to be taking advantage of the security vulnerability that necessitated WordPress 2.6.3, whereby if an attacker could get control of an RSS feed that you publish on your blog (for example using [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.theregister.co.uk/2008/11/06/trojanised_wordpress/"><em>The Register</em> mentions an attack on WordPress blogs</a> that tells users to upgrade to a bogus 2.6.4 version of WordPress.</p>
<p>This attack seems to be taking advantage of the security vulnerability that <a href="http://wordpress.org/development/2008/10/wordpress-263/">necessitated WordPress 2.6.3</a>, whereby if an attacker could get control of an RSS feed that you publish on your blog (for example using the RSS widget), he might be able to execute any commands. </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/beware-trojan-wordpress/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>TechCrunch: Do as We Say, Not as We Do with WordPress Upgrades</title>
		<link>http://pressedwords.com/techcrunch-on-wordpress-security/</link>
		<comments>http://pressedwords.com/techcrunch-on-wordpress-security/#comments</comments>
		<pubDate>Thu, 12 Jun 2008 08:03:13 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TechCrunch]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=92</guid>
		<description><![CDATA[A recent TechCrunch post makes it sound as if WordPress security releases are desperately following close on the heels of widespread attacks. The author, Nik Cubrilovic, then seems to suggest that open source applications are particularly at risk: Hackers are taking advantage of the open-source nature of the software to analyze the source code and [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A <a href="http://www.techcrunch.com/2008/06/11/my-blog-was-hacked-is-yours-next-huge-wordpress-security-issues/">recent TechCrunch post makes it sound as if WordPress security releases are desperately following close on the heels of widespread attacks</a>.  The author, Nik Cubrilovic, then seems to suggest that open source applications are particularly at risk:</p>
<blockquote><p>Hackers are taking advantage of the open-source nature of the software to analyze the source code and test it for potential vulnerabilities. It is then left up to developers and users to detect, track down, and then close off the vulnerabilities in the code that attackers are using. The pattern seems to be that when a new hole is found, it is broadly exploited, then developers rush out a patch and a new release.</p></blockquote>
<p>Agreeing with many of his overall points, such as the necessity of making frequent backups and keeping up-to-date, I thought it was interesting to note that the specific sites he mentions do not seem to support the premise that they fell even while diligently being updated.</p>
<p>By checking the source of these sites as cached by various search engines, you can see what version of WordPress they were using recently.  The <a href="http://www.nik.com.au/">first one</a> Cubrilovic mentions was &#8220;hacked&#8221; back in January, when it &#8220;was running the most recent version of WordPress available at the time.&#8221;   Apparently that attack didn&#8217;t inspire its maintainer to keep up with updates, as a cached page shows that as recently as the end of May it was using a version of WordPress, 2.3.3, that was seven weeks outdated.</p>
<p>Cubrilovic also links to another <a href="http://paulhaahr.com/blog/2008-06-01-hacked">compromised site</a>, whose owner admits that he had &#8220;been running an ancient version of WordPress and had meant to upgrade, but it never seemed urgent.&#8221;  At <a href="I was already at the latest, 2.5.1, and still got hit.">another he points out</a>, the owner says &#8220;I was already at the latest, 2.5.1, and still got hit.&#8221; However, a cache search shows that as of June 1 the site was still using version 2.5, five weeks after the 2.5.1 security release, suggesting that the attack came prior to the upgrade.  TechCrunch itself as of three days ago ran a version of WordPress over 10 weeks old.</p>
<p>Cubrilovic makes it sound like a WordPress user has to follow every bit of news about WordPress to stay safe: &#8220;For users of WordPress, backups are essential, as are frequent updates, monitoring your blog usage and tracking the official WordPress blog and other blogs for news of any new security holes.&#8221;  That&#8217;s not bad advice, but keep in mind that since WordPress 2.3 there has been a prominent, automatic reminder to upgrade whenever a new release comes out.  In each of the examples, the users had to ignore week after week this message at the top of their admin screens:</p>
<p><img src="http://pressedwords.com/blog/uploads/2008/06/please_upgrade.jpg" alt="A new version of WordPress is available! Please update now." title="A new version of WordPress is available! Please update now." width="426" height="171" class="alignnone size-full wp-image-93" /></p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/techcrunch-on-wordpress-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Zero-Day WordPress Exploit?  Probably Not</title>
		<link>http://pressedwords.com/wordpress-security-okay-for-now/</link>
		<comments>http://pressedwords.com/wordpress-security-okay-for-now/#comments</comments>
		<pubDate>Sun, 08 Jun 2008 18:16:19 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AnyResults.net]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=91</guid>
		<description><![CDATA[The blogosphere has been all a-Twitter about a WordPress security vulnerability. Known as the &#8220;AnyResults.net&#8221; hack, it redirects blog hits with Google as the referrer to one of several spam sites. According to Donncha O Caoimh of Automattic, this exploit took advantage of a vulnerability that has been fixed in the latest stable version of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The blogosphere has been all a-Twitter about a WordPress security vulnerability.  Known as the &#8220;AnyResults.net&#8221; hack, it redirects blog hits with Google as the referrer to one of several spam sites.</p>
<p>According to Donncha O Caoimh of Automattic, this <a href="http://ocaoimh.ie/2008/06/08/did-your-wordpress-site-get-hacked/">exploit took advantage of a vulnerability that has been fixed in the latest stable version of WordPress, 2.5.1</a>.  As he points out, although 2.5.1 sites have succumbed to the attack, the evidence so far is that they were compromised <em>prior</em> to being upgraded. O Caoimh has a thorough description of how to identify this hack, how to avoid hacks in general, and what to do to recover from a hack in general. If you manage a WordPress blog, you should read <a href="http://ocaoimh.ie/2008/06/08/did-your-wordpress-site-get-hacked/">his post</a>. </p>
<p>This topic has appeared in the <a href="http://trac.wordpress.org/ticket/6871">WordPress bug tracker</a>, on the <a href="http://wordpress.org/support/topic/179395">WordPress.org</a> <a href="http://wordpress.org/support/topic/180772/">support</a> <a href="http://wordpress.org/support/topic/180938">site</a>, and <a href="http://forums.digitalpoint.com/showthread.php?t=874041">a</a> <a href="http://www.askdamagex.com/t27457-wp-google-redirect-hack-is-back.html">number</a> <a href="http://www.brendonwilson.com/blog/2008/06/07/new-exploit-in-wordpress/">of</a> <a href="http://www.magpiebrain.com/blog/2008/06/01/wordpress-site-hacked/">people</a> <a href="http://clasione.blogspot.com/2008/06/wordpress-anyresultsnet-hack-search.html">have</a> <a href="http://www.jammersix.com/archives/wordpress-hacked-search-engine-traffic-stolen/">blogged</a> <a href="http://www.jammersix.com/archives/more-info-on-the-wordpress-anyresultsnet-hack-for-hijacking-search-traffic/<br />
">about</a> <a href="http://www.getrichslowly.org/blog/2008/06/08/patching-the-wordpress-anyresultsnet-hack">it</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/wordpress-security-okay-for-now/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Backporting WordPress Security Fixes</title>
		<link>http://pressedwords.com/backporting-wp-security-patches/</link>
		<comments>http://pressedwords.com/backporting-wp-security-patches/#comments</comments>
		<pubDate>Wed, 07 May 2008 03:14:29 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[2.3.3]]></category>
		<category><![CDATA[backporting]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=58</guid>
		<description><![CDATA[Alex Schleber so dislikes WordPress 2.5 that he&#8217;s worked out how to patch version 2.3.3 with 2.5&#8217;s security patches instead of upgrading. It&#8217;s an approach I would recommend against. For one thing, there&#8217;s a good chance that one won&#8217;t recognize all of the patches via changelogs, if for no other reason than that sometimes new [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Alex Schleber so dislikes WordPress 2.5 that he&#8217;s worked out <a href="http://businessmindhacks.com/post/wordpress-233-security-retro-fit">how to patch version 2.3.3 with 2.5&#8217;s security patches</a> instead of upgrading.  It&#8217;s an approach I would recommend against.  For one thing, there&#8217;s a good chance that one won&#8217;t recognize all of the patches via changelogs, if for no other reason than that sometimes new features&#8212;not just fixes&#8212;have obviated bugs.  Also, 2.5 introduced a number of features on the back-end that I would miss.</p>
<p>I am curious about his antipathy towards version 2.5, something he promises to blog about later. My guess is that it has to do with the design of the administrative back-end.  That just confirms my opinion that the WordPress admin should be template-able.  After all, no one ever decided not to upgrade WordPress because they didn&#8217;t like Kubrick. </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/backporting-wp-security-patches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress Attacks Mapped</title>
		<link>http://pressedwords.com/wordpress-attacks-mapped/</link>
		<comments>http://pressedwords.com/wordpress-attacks-mapped/#comments</comments>
		<pubDate>Tue, 06 May 2008 12:30:12 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=52</guid>
		<description><![CDATA[Franklin Veaux has diagrammed a network of compromised sites&#8211;including the Boston Public Library&#8217;s blog&#8211;that are geared towards installing viruses. He notes that there has been a surge of attacks recently against compromised WordPress sites, so the lesson is to be sure that you keep your WordPress version up-to-date. Veaux does link to some of these [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://tacit.livejournal.com/240750.html">Franklin Veaux has diagrammed a network of compromised sites</a>&#8211;including the Boston Public Library&#8217;s blog&#8211;that are geared towards installing viruses.  He notes that there has been a surge of attacks recently against compromised WordPress sites, so the lesson is to be sure that you keep your WordPress version up-to-date.</p>
<p>Veaux does link to some of these sites in his post, so don&#8217;t follow those links unless you really know what you&#8217;re doing.</p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/wordpress-attacks-mapped/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CSRF Attack on WordPress</title>
		<link>http://pressedwords.com/csrf-attack-on-wordpress/</link>
		<comments>http://pressedwords.com/csrf-attack-on-wordpress/#comments</comments>
		<pubDate>Wed, 13 Feb 2008 16:47:15 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[AYS]]></category>
		<category><![CDATA[CSRF]]></category>
		<category><![CDATA[nonce]]></category>

		<guid isPermaLink="false">http://pressedwords.com/csrf-attack-on-wordpress/</guid>
		<description><![CDATA[Someone named Ferruh has a proof-of-concept cross-site request forgery (CSRF) attack against WordPress (HT: DK at BlogSecurity). I&#8217;ve tried it out successfully on my own version of WordPress 2.3.3. The scenario is like this: you go to leave a comment on someone&#8217;s site, and surreptitiously that (evil) site tricks you into changing your WordPress admin [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Someone named Ferruh has a proof-of-concept <a href="http://en.wikipedia.org/wiki/Cross-site_request_forgery">cross-site request forgery (CSRF)</a> attack against WordPress (HT: <a href="http://blogsecurity.net/wordpress/ferruh-wordpress-csrf-vulnerability/">DK at BlogSecurity</a>). I&#8217;ve tried it out successfully on my own version of WordPress 2.3.3.</p>
<p>The scenario is like this: you go to leave a comment on someone&#8217;s site, and surreptitiously that (evil) site tricks you into changing your WordPress admin password and emailing it to the evil site owner by clicking what appears to be a comment submission button.  </p>
<p>WordPress guards against CSRF attacks in general by confirming actions that don&#8217;t seem quite right (<a href="http://markjaquith.wordpress.com/2006/06/02/wordpress-203-nonces/">i.e. when the <em>nonces</em> don&#8217;t check out</a>), but this attack hides all of the confirmation message except the approval button, which appears to be part of the evil site&#8217;s comment form.</p>
<p>It&#8217;s very easy to imagine how this could be targeted at a user&#8217;s blog by using the URL the user enters in an evil site&#8217;s comment form.  <a href="http://trac.wordpress.org/ticket/5838">I&#8217;ve submitted a suggested solution as a WordPress Trac ticket</a>. </p>
<p>How can you avoid this attack for now?  Don&#8217;t stay logged in to your WordPress blog when not necessary, and <a href="http://blog.bindanaku.com/2007/03/how-to-change-wordpress-default-username/">change the default username</a> (or blog under another username with just &#8220;author&#8221; permissions, and keep &#8220;admin&#8221; just for occasional site maintenance).  </p>
<p><strong>UPDATE: </strong> My patch has been committed to both <a href="http://trac.wordpress.org/changeset/6813">development WordPress</a> and the <a href="http://trac.wordpress.org/changeset/6818">2.3 branch</a>, so this issue should be taken care of in the next security release. </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/csrf-attack-on-wordpress/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting WordPress from SQL Injection Attacks</title>
		<link>http://pressedwords.com/protecting-wordpress-from-sql-injection-attacks/</link>
		<comments>http://pressedwords.com/protecting-wordpress-from-sql-injection-attacks/#comments</comments>
		<pubDate>Wed, 23 Jan 2008 18:31:04 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[mysql_real_escape_string]]></category>
		<category><![CDATA[SQL Injection]]></category>

		<guid isPermaLink="false">http://pressedwords.com/protecting-wordpress-from-sql-injection-attacks/</guid>
		<description><![CDATA[David Kierznowski at BlogSecurity suggests that WordPress is &#8220;insecure by design.&#8221; What he means is that in general WordPress does not sanitize MySQL queries. He recommends that WordPress provide &#8220;a proper set of SQL safe functions (i.e. $wpdb->escape_int and $wpdb->escape_str&#8221; and &#8220;use mysql_real_escape_string(), and have clearly defined coding standards and security policies&#8221; like Drupal does. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>David Kierznowski at BlogSecurity suggests that <a href="http://blogsecurity.net/wordpress/wordpress-insecure-by-design/">WordPress is &#8220;insecure by design.&#8221;</a>  What he means is that in general WordPress does not sanitize MySQL queries.  He recommends that WordPress provide &#8220;a proper set of SQL safe functions (i.e. $wpdb->escape_int and $wpdb->escape_str&#8221; and &#8220;use mysql_real_escape_string(), and have clearly defined coding standards and security policies&#8221; like Drupal does.  </p>
<p>Actually, the development version of WordPress has been implementing a new &#8220;<code>prepare</code>&#8221; method of the WordPress DB class.  The &#8220;<code>prepare</code>&#8221; method uses <code>vsprintf</code> to makes sure sure, for example, that integers are truly integers, which should accomplish the same thing as Kierznowski&#8217;s proposed <code>escape_int</code> and <code>escape_str</code> methods.  </p>
<p>And WordPress once actually did use <code>mysql_real_escape_string()</code>, over two and a half years ago.  The problem is that <a href="http://wordpress.org/about/requirements/">WordPress&#8217;s minimum requirements specify only that one use PHP version 4.2 or newer</a>.  However, <a href="http://us3.php.net/mysql_real_escape_string"><code>mysql_real_escape_string()</code> was not introduced until PHP version 4.3.0</a>, so WordPress had to rely on an alternate way of escaping queries, one that apparently <a href="http://trac.wordpress.org/changeset/2737">has caused some trouble, so the whole thing was bypassed</a>.  However, <a href="http://trac.wordpress.org/ticket/5416">PHP 4.3.0 functions have crept into development WordPress already</a>, so it&#8217;s likely by the time of the next release (version 2.5) in the spring, that the minimum version will have increased and WordPress will be free to use <code>mysql_real_escape_string</code>.  </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/protecting-wordpress-from-sql-injection-attacks/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using memcached
Database Caching 1/12 queries in 0.005 seconds using memcached
Object Caching 462/532 objects using memcached

 Served from: pressedwords.com @ 2026-04-14 20:42:43 by W3 Total Cache -->