Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-15 Thread anonymous
Couldn't you just target pretty much any dynamic page on the web with such a script? All you'd have to do is edit a few details. I don't understand how this qualifies as a security hole?

Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-10 Thread scaturan
afaik, there is no hardcoded workaround other than disable anonymous registration, using .htaccess/httpd.conf restrictions, or removing wp-register.php for the time being, if you're using mod_security, you can block it using something like this: SecFilterSelective THE_REQUEST wp-register.php

Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-10 Thread Don Voita
If you have the register user functionality disabled, like I do, you can rename wp-register.php to something else. This workaround prevented the DoS for me, and will hold you over until the developers have a chance to address this. Don [EMAIL PROTECTED] wrote:

HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-09 Thread h4cky0u . org
-- HYSA-2006-005 h4cky0u.org Advisory 014 -- Date - Wed March 08 2006 TITLE: == WordPress 2.0.1 Remote DoS Exploit SEVERITY: = Medium SOFTWARE: = Wordpress

Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-09 Thread scaturan
if you're using mod_security, try a variant of this ruleset: SecFilterSelective THE_REQUEST wp-register.php id:1004,deny,log,status:412 #SecFilterRemove 1004 - use this to remove the rule per virtual host, uncommented.