Re: [bitfolk] Security incident: Wordpress compromise

Top Page

Reply to this message
Author: Ian
Date:  
To: Bitfolk Users
Subject: Re: [bitfolk] Security incident: Wordpress compromise
Andy said:

> Upon further investigation it appeared that around 30th November one
> of the site's legitimate Wordpress admins had logged in from an
> unexpected place (a Tor exit node) and had uploaded a PHP file which
> appeared to enable full filesystem traversal, downloading of file
> content, shell command execution as Apache user, etc.


Is this something that was uploaded to the WordPress wp-content/upload
directories or as a plugin / theme?

Ian