lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 24 May 2007 11:57:20 -0500
From: Paul Schmehl <pauls@...allas.edu>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: WordPress Community Vulnerable

--On Thursday, May 24, 2007 09:44:02 -0500 Steven Adair 
<steven@...urityzone.org> wrote:

> So do you think his two WordPress blogs (I am assuming here..looks a lot
> like WP, but I'm not pounding out GET requests to verify) were included in
> this "survey" that was done?  I wonder if he's running a safe version?
> And as mentioned in one of his blog comments, version reporting isn't
> always reliable and patches that did not change the extractable version
> number could have also been applied.
>
> In any event, I think WordPress has increasingly become more secure.  It's
> had a small rash of issues a few months back ranging from SQL injection to
> someone actually backdooring the source, but it's grown up quite a bit.  I
> think someone would be hard pressed to actually come up with the Month of
> Wordpress bugs.  The majority of all other recently reported issues have
> all from third party add-ons that aren't actually a part of WordPress.
>
Yes, but the point of his post isn't that *Wordpress* is insecure.  It's 
that blog owners are not updating their software to maintain security. 
While anyone in IT would go "doh!", many in the "real" world might be 
surprised that the software has to be regularly updated and vigorously 
maintained to ensure ongoing security.

This isn't exactly news for us, but it may well be for the blogosphere in 
general.

-- 
Paul Schmehl (pauls@...allas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

Content of type "application/pkcs7-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ