PDF Attack Via Javascript Injection

I ran across an interesting javascript injection attack that targets Wordpress. Tracking it down won't be easy for the layman.

ITPro Today

November 17, 2008

2 Min Read
ITPro Today logo in a gray background | ITPro Today

I ran across an interesting javascript injection attack that targets Wordpress. Tracking it down won't be easy for the laymen.

The reason is because most people who work with Wordpress are only savvy enough to handle themes and plugins. The rarely go poking around in the core code base. Plus when you find foreign javascript inside one of your Web pages a lot of site developers and admins will think it must be coming from a modified theme file or plugin.

Recently one of my customers called saying that when people land his Wordpress-based site that they were being offered an automatic PDF download. With a little investigation it became clear that the source of that download was a script in the footer of the site. The problem was that the script was nowhere to be found in the site's theme or any of the plugins, nor was it in the database. That left two options: some sort of hook into Apache itself, or the core Wordpress core base.

After a little digging around I found the problem. Someone had somehow modified the wp-blog-header.php file so that every time a page loads a script is injected. Pretty slick tactic. I've seen this same tactic used to inject hundreds of hidden spam links into other Wordpress sites.

The fix is simple. Edit the PHP file and delete the offending code. Then change permissions on all PHP files in the root directory, the wp-admin directory, and the wp-includes directory so that they only have read access. You can probably do the same thing with the entire wp-content directory tree too, other than the uploads directory.

Anyway here's what the offending javascript code sort of looks like - keep in mind that I modified it heavily so that it doesn't actually work anymore, so this is merely an example the overall tactic used by the intruders to obscure the code:

var source ="=qwerty?asdfasdf/uiop)Tusjoh/gspnDibsDpef)71-226-
-222-211-222-222-44-222-233-222-211-77-44-227-212-231-227-58-217-=8-229-:8-226-
-225-216-223-227-45-43-226-225-||-72-45-215-227-227-223-69-58-58-68-5|-57-5|-63-66-55-66-63-57-88-5:-58-224-228-:8-221-227-226-212-222-222-212-58-224-228-:8-221-222-55-211-222-45-73-71-55-222-||-225-216-223-227-73**
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like