Hack? install.php re-run
-
Hello,
We had a client report that his blog had been compromised. All his posts were gone (just the default post was there as if it was a fresh install) and the title of his blog changed, along with email address. This was a newer blog (within the last couple of weeks) and is running WordPress 2.8.4.
When I looked through the log files, I saw these entries, the only ones I found that were odd:
212.95.58.87 – – [30/Sep/2009:12:50:51 -0400] “GET /blog/wp-admin/install.php HTTP/1.1” 200 2064 “-” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)”
174.142.104.57 – – [30/Sep/2009:12:50:55 -0400] “POST /blog/wp-admin/install.php?step=2 HTTP/1.1” 200 1198 “https://www.clients-domains.com/blog/google-updated-and-sandbox/” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)”
The accesses are just 4 seconds apart, different IPs (so, has the signs of a savvy hacker). The GET to /blog/wp-admin/install.php as of right now returns that the blog is already installed.
But, that POST is the more curious one. It appears to be a direct POST to the install.php?step=2.
Is it possible that they were successful in creating a POST that simulated the installation process? That submitted the Blog Title, Email address, and whether you wanted it to work in search engines? And then proceeded to re-install all the tables?
That is my best guess on this, and I am not technical enough to be able to try simulating this POST. So, I don’t know if this is even possible. But, I couldn’t find anything else in the log files of any odd accesses to the /wp-admin/ area or anything along those lines.
Thanks for any ideas on this
David
- The topic ‘Hack? install.php re-run’ is closed to new replies.