{"id":3180,"date":"2017-02-11T17:47:19","date_gmt":"2017-02-11T22:47:19","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3180"},"modified":"2017-02-11T17:47:19","modified_gmt":"2017-02-11T22:47:19","slug":"recent-wordpress-vulnerability-used-to-deface-1-5-million-pages","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/02\/11\/recent-wordpress-vulnerability-used-to-deface-1-5-million-pages\/","title":{"rendered":"Recent WordPress vulnerability used to deface 1.5 million pages"},"content":{"rendered":"<p>A vulnerability in WordPress\u2019 Rest API has been exploited by up to 20 hackers, which has impacted 1.5 million WordPress sites. Majority of these attacks occurred after WordPress disclosed the vulnerability. The vulnerability allows \u201cunauthenticated attackers to modify the content of any post or page within a WordPress site.\u201d Before WordPress publicly disclosed the vulnerability, they patched the issue in a Jan. 26 fix, however, a large amount of sites do not automatically install these patches, as administrators want to test the code before installing. As a result, after WordPress publicly disclosed the issue, the attackers were in a rush to impact as many vulnerable sites as possible, resulting in up to 800k sites to be violated in only 48 hrs. Although there are efforts by the web servers to block or filter the attacks, ultimately, if the a WordPress site is not updated to the latest release, it will continue being vulnerable.<\/p>\n<p><a href=\"http:\/\/www.csoonline.com\/article\/3168717\/security\/recent-wordpress-vulnerability-used-to-deface-1-5-million-pages.html\" rel=\"nofollow\">http:\/\/www.csoonline.com\/article\/3168717\/security\/recent-wordpress-vulnerability-used-to-deface-1-5-million-pages.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability in WordPress\u2019 Rest API has been exploited by up to 20 hackers, which has impacted 1.5 million WordPress sites. Majority of these attacks occurred after WordPress disclosed the vulnerability. The vulnerability allows \u201cunauthenticated attackers to modify the content of any post or page within a WordPress site.\u201d Before WordPress publicly disclosed the vulnerability, [&hellip;]<\/p>\n","protected":false},"author":14261,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[715345],"tags":[],"class_list":{"0":"post-3180","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-04-enterprise-architecture","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-Pi","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/14261"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3180"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3180\/revisions"}],"predecessor-version":[{"id":3181,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3180\/revisions\/3181"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}