BREAKING NEWS

Reviews

Laptops

Tablets

Wednesday, March 12, 2014

Wordpress installations abused by large DDoS attack

In a large DDoS attack is a functionality in Wordpress exploited to enhance the attack. Force That represents a security company. It is the XML-RPC functionality. Which can be exploited to spoof. Http requests

WordpressWeblogs use the XML RPC functionality including to let you know that is linked, called pingbacks to them. Other blogs That functionality is also abusing writes Sucuri security. Due to spoof as if they were coming from a particular website, http-requests a Wordpress website focuses his answer to that website.

That happened in a recent attack, in which 162,000 websites Wordpress unsuspecting users through xml-rpc set their sights on other Wordpress sites. In addition, the caching of the affected sites was circumvented by Wordpress to send the request, so the Wordpress installation had to serve a new page for each request and the database was consulted. Random numbers As a result, the sites were quickly flat.

It is not a security vulnerability in Wordpress, emphasizes Sucuri, the XML-RPC functionality is seen as a feature. Nevertheless, managers of a Wordpress website can manually disable pingback functionality. The security company has a tool published that allow administrators to check their Wordpress installation in the recent attack is abused.

Post a Comment

Share This

 
Copyright © 2013 My News My Blog
SEO by C4i Technologies