Survey Finds Most WordPress Blogs Vulnerable 82
BlogSecurity writes "Security analyst David Kierznowski shocked bloggers yesterday with a survey showing that 49 out of the 50 WordPress blogs he checked seem to be running exploitable versions of the widely used software. He said, 'The main concern here is the lack of security awareness amongst bloggers with a non-technical background, and even those with a technical background.' Mr Kierznowski also uncovered recent vulnerabilities in WordPress plugins that ship by default with the software, adding: 'WordPress users developing plugins must be aware of the security functions that WordPress supports, and ensure that these functions are used in their code.'"
Blogs are vunerable? (Score:5, Funny)
Re:Blogs are vunerable? (Score:4, Funny)
at my previous job there had been a programmer who used the same password for *everything*, and I do mean everything... from the mysql logins (both "root" and regular webapp), web site logins, shell accounts and the ssh passwords needed to move data around!
I discovered he had a blog site, and guess what, his standard password worked on that too, both to login as him and as admin. Whilst tempted, I neither added nor deleted anything on his site, but I *did* go occasionally go through his blog posts and correct his spelling and grammar! He must have noticed because after many months of occasionally tweaking his content, the login finally stopped working. Yes, I'm talking about you, "smurphy" :-)
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:1)
And mods, my original post is not flamebait... but the truth. It's one of the reasons to use OSS. If it has security holes, you're free to find them yourself.
Re: (Score:2, Insightful)
irony? (Score:1, Interesting)
Re: (Score:2, Insightful)
How do you fix it? (Score:3, Interesting)
Re:How do you fix it? (Score:5, Informative)
Block Spam injections [pathf.com]
Directory traversal attacks SecFilter "\.\./"
XSS attacks
SecFilter "<(.|\n)+>"
SecFilter "<[[:space:]]*script"
SQL injection attacks
SecFilter "delete[[:space:]]+from"
SecFilter "insert[[:space:]]+into"
SecFilter "select.+from"
Too many times there are clueless admins (not you per se). But this also tends to be one of the grips on the Ubuntu Document [infiltrated.net] people flame me for. If *semi* even experienced admins can't lock a machine down... Imagine when Ubuntu on Dell becomes the next hot thing. Flame as much as you'd like facts are facts
Re: (Score:2, Informative)
Users should 'fix' wordpress by keeping upto date with the latest stable versions of PHP and wordpress; security is a process and not a product. Personally I wouldn't use wordpress, it may be one of the better written PHP web-apps but unfortu
Re: (Score:2)
Re: (Score:1, Redundant)
SecRule REQUEST_BODY "@validateByteRange 1-255" "log,deny,phase:2,t:none,msg:'ModSecurity ASCIIZ Evasion Attempt'"
Now back to a response... My point is that you responded to a request from an end user with the wrong solution. It's not a solution for a single end user running WP in a shared hosting environment or virtual machine
You must be kidding? I have about 15 other sites hosted on the same box and my rules affect no one but
Re: (Score:2)
What would do if a security flaw was found in your blog?
a) Update to the latest version.
b) Make a mod_security rule to block it.
If you choose a) then mod_security is redundant.
If you choose b) then your a idiot.
Re: (Score:3, Insightful)
Re: (Score:1, Informative)
Instructions on upgrading WordPress. [wordpress.org]
This assumes you control where your site is hosted. If it's a WP install provided by your hosting provider, ask them if they're up to date, and if not nag them until they are.
(Now to see if posting AC cancels the mod points I'd already used here.. Ooh, a CAPTCHA!)
HTH, NickFitz.
Re: (Score:2)
On the other hand, my wife needs to write some WordPress blogs for a client and neither she nor the client want to "play computer." They just want to add content. I was looking around for what would essentially business class WordPress hosting. They don't want bluehost or dreamhost at $7/mo and you get to run Fastastico, they just don't want to do that.
Can anyone recommend a good, high quality, WordPress hosting company that handles
Re: (Score:1, Informative)
Hmm, perhaps Wordpress.com [wordpress.com]? I'm fairly certain that they offer hosting on your domain name now, not just at username.wordpress.com.
(Not a shill, just trying not to undo my moderations.)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
This means Dreamhost customers have to update their Wordpress installations manually.
A trivial matter to most of us here, but for those that have become accustomed to using Fantastico's 'Your Wordpress Installation is out of date! Click here to upgrade' it's a good deal more time-consuming.
self-updating (Score:3, Insightful)
Re: (Score:3, Insightful)
Oh noes! (Score:2)
Time for web applications to grow up (Score:5, Insightful)
I think it's about time web applications like WordPress included an update service. Put update notifications into an Atom feed pointing to tarballs incorporating an update script, patches, etc, and label them as security/minor/major. Have the system periodically retrieve them, automatically apply the security updates, and prompt the admin next time he logs in to apply the others.
The only difficulty is that the developers need to have proper release management. No more bundling security fixes into whatever the latest development version is. No more releasing updates that fiddle with styles at the same time as fixing serious bugs. I don't think that's feasible for many web applications, but it's certainly achievable for bigger projects like Wordpress.
I can't think of any web application that does this already off the top of my head. Does anybody know of any projects doing this?
Re: (Score:2)
The closest thing I can think of is that there is a module for drupal that will check for updates and inform you. Last I checked it would give you download links, but that's as close as it got to installing them. I wrote a module installer at one point (I think there is one, but I actually did an integration job) but then a better release monitor was released, and so I abandoned
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:1)
What should I do when I see a post containing gross factual inaccuracies moderated as "informative"?
There really ought to be other downward moderations, but while there isn't a "just plain wrong", one _has_ to use "overrated". One might posit that for every type of moderation there ought to be an equal and opposite one.
Informative <-> Wrong
Interesting <-> Tedious
Insightful <-> Well duh!
Funny <-> 3 Stooge
Re: (Score:2)
That's a great question. I don't have a good answer. Perhaps I will change my sig a touch. Something to the effect of that the fact that it does not go to metamoderation provides only for abuse.
Re:Time for web applications to grow up (Score:4, Insightful)
Re: (Score:1)
Re: (Score:3, Insightful)
It depends on what you mean. Wordpress already tells you when a new version is available. What it doesn't do is automatically install it for you. In the case of PHP apps, this is a good thing. (At least, as far as running a PHP app in the first place can be considered a "good thing".)
Wordpress installations rarely run the vanilla software. Usually the look has been customized by modifying templates and/or plugins have been ad
Re: (Score:3, Insightful)
Actually, this isn't true -- provided you use some common sense about how you customize your Wordpress blog. It doesn't make a lot of sense to go ahead and apply all your customizations to a theme called "default," for example (though I'm sure that lots of people do this). When you go and untar the new version,
Re: (Score:2)
That's assuming, of course, that you can use the old template. The new versions might contain changes to the modified files that can't be simply copied over.
Not that I'm disagreeing with you about
Re: (Score:2)
They might. In practice, they seldom seem to -- Wordpress may change but the APIs seem pretty stable. But, yeah, this is one of the things that makes Wordpress sort of a PITA.
Re: (Score:2)
The updates are better done by the hosting control panel, assuming that i
Securing LAMP (Score:5, Informative)
SecFilterSelective REQUEST_URI
SecFilterSelective REMOTE_ADDR "!^YOUR.IP.ADDRESS$" redirect:http://www.infiltrated.net/sorry.jpg
SecFilterSelective ARG_username YOURUSERNAME chain
SecFilterSelective REMOTE_ADDR "!^YOUR.IP.ADDRESS$" redirect:http://www.infiltrated.net/sorry.jpg
Where your IP address and your username are the only ones to allow anything to the admin page. Anything else gets redirected elsewhere.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Time to upgrade again (Score:3, Informative)
http://codex.wordpress.org/Upgrading_WordPress [wordpress.org]
SQL injection? (Score:3, Informative)
Wordpress (Score:3, Interesting)
Re: (Score:2)
Re:Wordpress - a correction (Score:3, Insightful)
2.2 fixes bugs I never noticed and new features I didn't immediately need, so I can see why even good blog administrators might have waited to upgrade
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
People run old software? Really? (Score:3, Insightful)
So if it's news to you that people run old and/or vulnerable software, then this might be something new. Otherwise it's just what I would expect.
what about Blogger? (Score:1)
Re: (Score:2, Insightful)
This doesn't have anything to do with the WordPress crew sucking at security, just their users.
Some perspective please (Score:1)
That said, let's get some perspective on what is described by the author as "a desparate (sic) attempt to try and educate WordPress Plugin developers to some of the common security problems that can occur."
From a quick reading of the guy's postings, these weaknesses really only allow one thing: Admin access to the Wordpress site.
For the v
Quelle suprise! (Score:2)
You either do it yourself and accept the consequences, or find a host with a clue. wordpress.com will even host it for you for the ultra-easy-free option (though they'll charge for extra features).
Just like... well, everything else you might run on a server. Including the OS.
I was hacked... (Score:2, Insightful)
As someone who has just recently been hacked (Druapal 5.1, not WordPress, but I almost went that direction) I can say that I've recently seen my fair share of hacked Wordpress sites (via links to/from referrers) that have been listed as 'defaced' with, "Attack Technics : FTP Protokol" listed on the bragging-rights page. In my particular case it was because my hosting service allows anonymous FTP uploads(?!) with no 'correct' way to disable it (???!!!) -- my solution was to allow 0KB of FTP transfer for anon
Re: (Score:2)
So, this had nothing to do with Drupal, right?
Re: (Score:1)
I shure as hell hope so. Before this post and after making the changes to FTP quotas, I had 41 hits from that page and have not been hacked again.
I did make one other change: I moved the install.php file out of my web directory. However my statistics (AWStats) do not show any access to that file for the time period.
I was able to recover well enough with some decent backups (mysqldump) and some help from the Drupal forum.
If I have any more updates on this, I'll be posting them in the drupal forum [drupal.org].
So I read this as... (Score:3, Insightful)
Good riddance if that is the case. If they cannot adapt to the needs of its users, they deserve what will come to them, though their users do not
It's a trap! (Score:1)
How did BlogSecurity get this information? (Score:1)
What does incrementally harvested mean? How did BlogSecurity obtain the version info from the blogs it polled, and how did they go about picking which blogs to poll?
There seems to be a lot of FUD in this article, and it's quickly cobbled together. There's no discussion on *how* vulnerable each version is. 2.1.3 was released April 3, but is discarded simply because the latest stable version is 2.2. Ve
Re: (Score:1)
I'd be happy if my wordpress site gets hacked (Score:1)