TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Another wordpress core exploit in the wild

2 点作者 parito超过 8 年前

1 comment

parito超过 8 年前
This privilege escalation vulnerability affects the WordPress REST API that was recently added and enabled by default on WordPress 4.7.0.<p>So basically people who updated religiously were hit, and those who did not, were fine.<p>I am left wondering if running wordpress sites in read-only state (both files and database) should be the only reasonably safe method.<p>A lot of people run the files with php ownership (so they could update via &#x2F;wp-admin, or they just don&#x27;t care) which opens the site to be exploited by any vuln plugin&#x2F;theme<p>But now it looks like even running proper permissions (NOT www-data) on files is no longer enough, and we should consider mysql in read-only state when no editing is happening...<p>VERY SAD.