Forum Replies Created

Viewing 2 replies - 1 through 2 (of 2 total)
  • Thread Starter brigwyn

    (@brigwyn)

    @samboll

    It was suggested as a possiblity by a fellow wordpress blogger. So I did some searching and came accross this post:
    http://stackoverflow.com/questions/826191/strange-elements-appearing-in-javascript-rich-text-editors

    In the article it described the initial code I found in my new posts:
    <input type="hidden" id="gwProxy" /><!--Session data--><input type="hidden" id="jsProxy" /><div id="refHTML">&nbsp;</div>

    I had noticed this but thought it was related to a plug-in until this was brought to my attention is a 100% match. So I’m guessing this proxy code opens up a vulnerability that could be used for something else including possibly injecting some other malicious code.

    Just a thought anyways, but seems to make sense to me.

    And for the cleaning up posts. Thank, I’ll re-read the article closer this time.

    All your help is much appreciated.

    Thread Starter brigwyn

    (@brigwyn)

    @samboll
    I appreciate the link but that isn’t the issue in this case.

    The issue is with the individual posts themselves contained in the wp_posts table. To be more specific the post_content column for each record within the wp_posts table.

    As stated in the post the new installation is clean, meaning brand new.

    Also as stated in my original post I deleted all of the old files and folders. This includes WP related ones. There is none of the old 2.7x content, files, themes or images on the files themselves.

    I’m thinking it is best to export the wp_posts table and manually edit but I was hoping for any other suggestions. Since that would be pretty intensive.

    UPDATE: Original vulnerability might be related to using FireFox and the Browser Highlighter plug-in.

    Thanks again.

Viewing 2 replies - 1 through 2 (of 2 total)