wordpress.org/development/2007/03/upgrade-212 -> wordpress.org/development/2007/03/upgrade-212/
Longer explanation: This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. We took the website down immediately to investigate what happened. org, and had used that access to modify the download file. They modified two files in WP to include code that would allow for remote PHP execution. This is the kind of thing you pray never happens, but it did and now we're dealing with it as best we can.
We are also taking lots of measures to ensure something like this can't happen again, not the least of which is minutely external verification of the download package so we'll know immediately if something goes wrong for any reason.
reset your password on the forums before you can login again. If you're a customer at a web host, you may want to send them a note to let them know about this release and the above information. Thanks to Ryan, Barry, Donncha, Mark, Michael, and Dougal for working through the night to figure out and address this problem, and thanks to Ivan Fratric for reporting it in the first place.
org that you can email questions to, and we'll be updating this entry with more information throughout the day. Nothing in the Subversion repository was touched, so if you upgrade and maintain your blog via SVN there is no chance you downloaded the corrupted release file.
|