Wordpress.org Warns of Active Worm Hacking Blogs 103
Erik writes "Wordpress, the popular open-source Content Management System (CMS) for many thousands of bloggers worldwide, is under attack from a 'clever' worm that automatically compromises unpatched versions of the Wordpress system. The particularly nasty bug crawls the web for vulnerable Wordpress installations, installing malware, deleting content, and generally wreaking havoc wherever it can. Today, Wordpress founder Matt Mullenweg eloquently implored Wordpress bloggers to update more frequently. Originally, updating the Wordpress system was a rather laborious process; however, newer versions offer fast and simple one-click upgrades. The two most recent versions of Wordpress (2.8.3 and 2.8.4) cannot be attacked by the worm discovered this week, and blogs hosted at Wordpress.com are also apparently immune."
"Clever?" (Score:5, Insightful)
There have been widespread worms that did this sort of thing before (phpBB comes to mind). Does this one do anything novel that makes it deserve the adjective "clever?"
-:sigma.SB
Re: (Score:1)
There was exactly 1 really clever worm of this nature. The internet worm created by Robert Morris Jr. [ryerson.ca] 21 years ago. And perhaps the first worm in a PHP/CGI app which was not this one.
The rest have just been copycats, non-original. And the payload isn't even clever.
Hey Wordpress... (Score:5, Insightful)
Maybe you should stop putting the Wordpress version in meta tags on the page? Or at least make it opt(-in)ional?
Re: (Score:3, Informative)
As outlined in TFA (yes, I know, I know) that's snake oil. You can run response tests to determine a version.
Re:Hey Wordpress... (Score:5, Insightful)
I wouldn't say it is snake oil. Putting versions in a page allows you to Google for it. Which makes the attack a lot easier. It also allows the attacker to do reconnaissance a lot less detectably a hold of time, and then spring it on everyone at once.
Re: (Score:2)
It also allows the attacker to do reconnaissance a lot less detectably a hold of time
You're at +3 Insightful so I guess this means something, but perhaps not in English . . .
Re: (Score:1)
I only mention salted passwords because Wordpress uses them [openwall.com] (see wp-includes/class-phpass.php).
Re: (Score:1)
Salted passwords have nothing to do with what essentially is the same thing as obfuscating banners on web or mail servers. Salted passwords significantly improve security.
Do you even know what a salted password is? Instead of brute forcing hash(password) you brute force hash(salt + password). Since the salt is always going to be known, brute forcing hash(salt + password) takes no more time then brute forcing hash(password). All it protects against are run-of-the-mill rainbow table attacks
Obfuscating b
Re: (Score:2)
Besides, the point of a salt isn't to make something unknowable, it's to make it hard to brute-force. I don't know that the statement "the salt will always be known" is a valid one. The
Re: (Score:1)
The statements "the salt will always be known" and "it's different for each password" aren't mutually exclusive. You can have a unique salt for each user / password and still always know the salt for each of those users.
Also, in the case of Wordpress, I imagine the only password an attacker would be interested in would be that of an admin. Presumably you w
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
s/your/you\'re/
Re: (Score:1)
s/backups/updates/
s/your/you\'re/
s/wifi-less slashdot-less/deepest dimension of a hell hole containing Episodes 1, 2 and 3/
Re: (Score:1)
The worm could be designed just to find as many wordpress installs as possible and attempt the exploit on all of them, regardless of version number.
Using searches for wordpress-specific files as search keywords to identify them.
the problem with one-click upgrades (Score:4, Insightful)
If wordpress.org is hacked, again [wordpress.org], their one-click upgrade feature means instant ownage for all Wordpress blogs everywhere.
Re: (Score:1)
- Open your favourite shell (click, sometimes)
- wget the patch file
- read through the patch file if you think it may be an ownage patch
- apply patch file
- ???
- Profit. Too bad for all those that have to manually apply the patch for lack of patch (or something similar)
Re:the problem with one-click upgrades (Score:4, Insightful)
That problem isn't specific to 1-click updates. It exists equally with 0-click updates (like Firefox's minor updates) and 50-click updates (like WordPress used to have).
You can improve the security of updates by using multiple layers of software protection (e.g. https AND code-signing). You can't improve security by increasing human involvement in the update process and then blaming users who update while the site is hacked. Increasing human involvement just makes it slower and limits the kinds of software protection you can use.
Re: (Score:1)
No, when you click the "auto upgrade" button, WP prompts you to enter the hostname, FTP username, and FTP password, to apply the upgrades.
Now, this does pose a security risk if your site is compromised (unbeknownst to you), and the attacker manages to use SQL injection to redirect you to a 'fake upgrade page'
When you click the upgrade button, and provide your credentials... the attacker has co-opted the web-ui, and you're sending the FTP username and password directly to the kiddie, giving them the me
Re: (Score:2)
But then, I'm running it on my own LAMP.
Re: (Score:1)
Re: (Score:1)
Au Contraire. I think if it can modify itself, the site clearly has incorrect file permissions. It's intended behavior that scripts can't modify themselves.
Actually, I use SELinux configurations to make sure Apache can never write to files in web content directories.
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
I actually don't think it does outweigh the risk... it's not that much harder to enter credentials to update the files.
There are a lot of good ways to implement auto-update that don't require self-modifying scripts. A good example, would be to have a yum repository, and deploy updates with "yum update"
Or even to have the user setup a daemon during install that checks for and applies updates.
If the script can modify files in the web folder, there is much more serious damage a script kiddie can do if
Re: (Score:1)
So they'll be able to upload malicious js files.
They will be able to serve fishing sites form your web server to some degree.
And anyway usually you can update php code easily: remove everything and update a new version from development site. But the most difficult task is to clear the database, so that to keep useful content and to remove malicious changes. Usually it
Re: (Score:2)
The problem with "simple one-click upgrades" is that the web server, usually Apache, requires full read/write privileges to the directories and files that Wordpress lives in. Talk about a massive gaping security hole.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
None of them are particularly likely to be an attractive nuisance. Popularity brings its own problems.
If I were going to write blogging software, there is a dangerous possibility that it would render static html, which I would have to laboriously rsync to the server. But maybe that isn't blogging software anymore.
Re: (Score:2)
Most people go the opposite direction and insist on rendering everything dynamically. I like the approach you're considering much better; in fact, it's exactly the approach I took when I wrote the CMS that drives th
Re: (Score:1)
how many different shapes of wheels can you invent?
ok, round. .. round!
ahh, and round.
what was that other one
jobst
Re: (Score:1)
Haven't they ever heard of signed patches?
Why can't they make the one-click upgrade verify a GPG signature before performing the installation of the code contained in the upgrade file?
Captain Obvious to the Rescue (Score:1)
So let me get this straight. If I have a blog that doesn't allow other people to
Re: (Score:2)
Re: (Score:1)
This interests me because I've seen the same thing in the last couple of days. Normally the only reason anyone registers on my blog is to post a comment. I have my settings so I have to approve the first comment and after that they're good to go - so it was odd to see a couple of registrations with no comment approval coming straight after.
Now I've gone to check... they're all gmail accounts. *suspicious*
maybe if they used their release notification list (Score:1, Insightful)
http://wordpress.org/download/ [wordpress.org]
When you download Wordpress, you're asked for your email address for release notifications. Shame they don't actually use it:
http://wordpress.org/support/topic/230558 [wordpress.org]
What's the point of offering it if they don't use it? Also, their blog has such a terrible noise-to-quality ratio that it's absolutely useless in this regard. All I care about is whether a new version is available or not - I couldn't care less about what new "awesome" features they've added or are trying to
Re: (Score:3, Informative)
The admin dashboard alerts you whenever a new version is available. You don't even need to register with/check thei
Re: (Score:2)
Yes, but that assumes you regularly visit your admin panel.
Re: (Score:2)
Whenever you login as an admin to post, or do something else, that is your default landing spot.
If you choose not to do anything, because some precious widget might break, or you have a hair appointment in 20 minutes, and continue doing so through numerous point releases, you get what you paid for eh?
Or as Duncan Chalk said:
"Pain is instructive"
Re: (Score:2)
I understand that contributors/authors who haven't any access to the administrative features won't be able to see the version (but that also assumes they wouldn't be in a position to upgrade either). But really, what's the poi
Re: (Score:2)
You see the admin panel when you log in.
The admin panel shows you when an update is available.
Therefore, you may be up to a half a month behind on update notifications delivered through the admin panel.
A half a month doesn't sound like a big deal but look at the most recent releases:
They really need an e-mail distribution list for
Re: (Score:2)
But really, what's the point of using WordPress if you're not going to use the admin panel? It shows a wonderful overview of comments, spam, drafts, and so forth. I would assume that the idea of never visiting the dashboard enough to notice new versions might be applicable to those use cases of individuals who make a post once every 2 months.
But to be honest I think that's a reasonable use case. It's the kind of use I make of Wordpress. I view my site as more of a homepage than a blog - I use Pages much more than Posts and make changes only rarely. As a result it'll often be several weeks between my visits to the admin page.
It's a shame; for people like me the notification mailing list would be perfect but for some reason the Wordpress folks don't make use of it. It's odd that they still encourage people to join it as it can give you a false se
aghhhh!!! (Score:4, Funny)
Now even my own blog says that I need to enlarge my Penis!
Re: (Score:1, Funny)
A clever worm, regardless the interpretation.
Re: (Score:2, Informative)
Re: (Score:2)
Another famous victim (Score:2)
Re: (Score:1)
Hey, he can't spend all day on the toilet.
Re: (Score:2)
Scoble's blog was hosted by Wordpress.com for about four years. During that time he wasn't hacked once. When Scoble was hired to pimp Rackspace, his blog moved to a box at Rackspace, and evidently no-one at Rackspace keeps up with security patches. Not a good look for a hosting company.
Why people don't update (Score:2, Insightful)
The reason most siteowners are slow or never update is because it's a huge pain in the butt.
This applies to almost all CMS's, forums, and similar software.
While a one-click solution sounds nice, the real problem is that almost any large board has a number of plug-ins and modifications to get it where it needs to be.
Once those mods/plugins are installed, the one-click updates no longer work.
SEO URL's?
Custom themes?
Anti-bot measures?
All of these things can completely render an "easy update" useless.
The people
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Yep, this. I tried to do the upgrade and was a little surprised when it asked for FTP login information. I had never even tried the "automatic upgrade" because I knew making my entire wordpress install modifiable by apache was a blatantly bad idea.
The use of the FTP account to do it makes a good deal of sense, and is about the best they can do.
Honestly the manual upgrade is so easy as to be laughable anyway, but for the frequency of WP updates, anything that makes it easier is still a good thing.
Re:Why people don't update (Score:5, Informative)
There is also a interesting point regarding software repository support. I have a server running Ubuntu 8.04 LTS Server which is supposed to be supported till April 2011, however Wordpress is in the Universe repository and not updated since November 2008 and is vulnerable to a few attacks that delete content.
If these packages are not going to be updated should there not be at least a warning, or method to bar such packages from being installed after security issues have been raised?
Wordpress 2.3.3 [ubuntu.com] in 8.04 LTS Universe repository.
Re: (Score:2)
Re:Why people don't update (Score:5, Informative)
*sigh* I don't think you understand how package management and security fixes in debian / ubuntu works. New releases of software almost invariably introduce new features, as well as bug fixes. For that reason, important fixes for security issues are backported, and the version number stays the same. (Introducing new features to a LTS / stable release wouldn't be acceptible.)
Now, what you said is technically true - if it's not being actively maintained for security fixes it *should* be removed - but the fact that Ubuntu's universe package of wordpress is still at 2.3.3 doesn't in and of itself mean that it hasn't been patched with the latest security fixes.
Re:Why people don't update (Score:5, Informative)
I understand the Debian/Ubuntu package management and security release system quite well; I happen to work or a certain "Large Virtual Server Company" and I've been using Debian almost exclusively on my systems for almost ten years.
Re: (Score:2)
Re: (Score:1)
Unlike Ubuntu, Debian does support anything in their repository. There was a security update for wordpress last month. They also do remove packages in which security supp
Re: (Score:2)
Why don't people upgrade? Well in my case, I didn't upgrade because I knew that upgrading would immediately kill both the aftermarket theme and several of the aftermarket plugins that I was using, some of which had a huge amount of non-trivial data stored in them. All the plug-ins and theme bits came from WordPress-blessed sites, which made the time-bomb nature of their unsupportedness even more frustrating. After fighting through several minor updates and then looking at a major one, I just gave up, exp
Thats why I use www.SimpleScripts.com (Score:2, Informative)
Re: (Score:2)
Yeah, but you actually CARE. Anyone who runs a Wordpress blog is greeted, in mile-high-flaming letters, with "YOUR WORDPRESS VERSION IS OUT OF DATE, CLICK HERE TO UPDATE" whenever he logs in to the CMS when it's running a version other than current. The hole being exploited by this worm was fixed about six months ago.
In other words, the people who are getting hit by this worm have been ignoring the reminders to upgrade for at least half a year.
Re: (Score:1)
And if you're really lazy, or don't regularly update your blog, you can even enter your email on the Downloads page of Wordpress.org and they will email you whenever a stable version comes out.
Re: (Score:2)
Or rather, they won't. [wordpress.org]
Thanks (Score:1)
Re: (Score:2)
Nice information (Score:1)
Instead of a passionate plea to the users... (Score:1, Flamebait)
... how about he makes a passionate plea to the PROGRAMMERS to say 'Guys, let's STOP PUTTING SECURITY HOLES IN OUR SOFTWARE?'
Just a thought.
It shouldn't be any user's problem to need to 'upgrade or get hacked'. If you're writing web software that's hackable, you're the one doing it wrong., not your users.
Technical details ? (Score:1)
Does anybody have any technical details about this worm ?
Some people can't upgrade immediately and it would be nice to be able to block the request strings (or user-agent, IP address, whetever) that the worm uses.
I have looked around the various blogs reporting this and on full-disclosure lists but I can't find any better advice than "Upgrade. Now."
updates (Score:2)
If only Matt stopped breaking backwards compatibility, I would be up to date constantly. In the last few years I've seen several things breaking as matty decided to rename hooks and stuff. Therefore, all important functions of my sites must be checked before actually upgrading...