I just received the following in my server logs:
comment: to6759@[my domain]
redirect_to: to6759@[my domain]
url: to6759@[my domain]
Content-Type: multipart/alternative; boundary=4531a12f2b5c30d6106376b2881e01d6
Subject: comply or to refuse
This is a multi-part message in MIME format.
Content-Type: text/plain; charset=\"us-ascii\"
soothing him . o, darlint they only knocked off half
submit: to6759@[my domain]
subscribe: to6759@[my domain]
comment_post_ID: to6759@[my domain]
email: to6759@[my domain]
...sent with the following headers:
POST /home/wp-comments-post.php HTTP/1.1
Host: [my domain]
Referer: [my domain]
Now I have searched for a related topic, but could find nothing really addressing this (but if I missed something, apologies in advance).
Is it possible for the comment notification e-mail to be injected using the information this spammer has submitted? I am using WP 2.0.2, if that helps at all.
Incidentally, this spammer's attempt was blocked by one of my spam plugins, but I want to make sure that there is nothing vulnerable about WordPress that would allow the e-mail headers to be injected. I had a brief look at the code, but I wasn't able to find the comment notification function to see whether or not it was vulnerable.
Thanks in advance for any info.