Threat Level: green Handler on Duty: Pedro Bueno

SANS ISC InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

WordPress iframe injection?

Published: 2010-02-05
Last Updated: 2010-02-05 23:57:23 UTC
by Jim Clausing (Version: 1)
4 comment(s)

One of the things we seem to harp on here at the SANS Internet Storm Center is monitoring your logs.  One of our faithful readers, Neal, sent us an e-mail this afternoon regarding some strange entries he found in his Apache logs (see below) and some rumblings of a number of WordPress blogs being compromised.  He was in contact with one of the affected bloggers and they figured out that the compromise resulted in the injection of some obfuscated javascript that created a hidden iframe.  We haven't heard exactly what the vulnerability was that was exploited, but if the log entries are actually related there may be a permission problem or perhaps some sort of SQL injection issue with joomla or the tinymce editor (at least, that is what the log entries showed that someone is looking for).  If any of our readers have info on what the vulnerability is (a Google search didn't show anything recent for tinymce, there was a Joomla vulnerability reported in January but the exploits I've seen didn't touch license.txt), please drop us a line and we will update this diary.  The particular log entry that caught Neal's attention was

GET /joomla/plugins/editors/tinymce/jscripts/tiny_mce/license.txt

So you may want to be on the lookout for those in your own logs.

---------------
Jim Clausing, jclausing --at-- isc [dot] sans (dot) org

SEC 503: Intrusion Detection In-Depth coming to central OH beginning 22 Feb, http://www.sans.org/mentor/details.php?nid=20864

Keywords: iframe WordPress
4 comment(s)
Diary Archives