Updating joomla 1 5

by  |  02-Feb-2015 00:08

Long story short: If you downloaded Word Press 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.Longer explanation: This morning we received a note to our security mailing address about unusual and highly exploitable code in Word Press.The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code.

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file.

We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack.

They modified two files in WP to include code that would allow for remote PHP execution.

This is the kind of thing you pray never happens, but it did and now we’re dealing with it as best we can.

Although not all downloads of 2.1.1 were affected, we’re declaring the entire version dangerous and have released a new version 2.1.2 that includes minor updates and entirely verified files.

Community Discussion