WordPress just announced that the source code of three plugins for its popular blog-hosting software was maliciously modified.
Plugins consist of add-in modules which you install on your WordPress server in order to implement additional functionality, instead of writing all the needed code yourself.
Where you might use a DLL with a Windows program – for example, to add a feature such as SSL support or an edit control into an existing application – you’d use a plugin with WordPress.
According to WordPress, the modified plugins were Trojanised to include backdoors.
Web-based backdoors can be extremely dangerous. If you’re a WordPress user, you’ll know that the WordPress platform includes a complete and powerful administration interface, password-protected, via a URL such as “site.example/wp-admin”. A WordPress backdoor might offer something with similar functionality, but using a different, unexpected, URL, and using a password known to the hacker, instead of to you.
As far as I can see, this attack doesn’t affect you or your users unless:
* You run your own installation of the WordPress platform.
* You use one of these plugins: AddThis,WPtouch, or W3 Total Cache.
* You updated your installed copy of one of those plugins in the past 48 hours from wordpress.org.
(WordPress says “in the past day”, but its post is dated simply 21 June 2011. So I’ve boosted that “day” to 48 hours to cover all reasonable interpretations of the WordPress statement. If you changed one of the abovementioned plugins inside a 48-hour window, why not check with WordPress exactly when the danger period was?)
The unwanted source changes have been reversed out, so the very latest versions of the affected plugins are now safe. If you installed a defective one, update it right away and you’ll be safe again.
All wordpress.org passwords for the Support forums, WordPress Trac, and the repository have been force-reset. (This means you have to reset your password, just as you would if you forgot it.)
WordPress also temporarily blocked all access to the plugin repositoryand verified that no other plugins has been Trojanised.
A good response following criminal behaviour.
So, if you’re a WordPress user, don’t freak out when you’re asked to reset your password on your next login. And please take WordPress’s advice:
As a user, make sure to never use the same password for two different services, and we encourage you not to reset your password to be the same as your old one.
(Note. Naked Security runs on the WordPress platform, but we don’t use wordpress.org. We’re hosted by WordPress.com VIP on wordpress.com. We checked with WordPress, and they’ve confirmed that no plugins in the WordPress.com VIP infrastructure were affected. No danger, Will Robinson.)