Security Advisory 2010-12-15
phpmyfaq.de compromised
- Issued on:
- 2010-12-15
- Software:
- phpMyFAQ > 2.6.10
- Risk:
- Critical
- Platforms:
- all
The main server of the phpMyFAQ Project was compromised in an attack, allowing a rogue version
of the phpMyfAQ software to be uploaded and distributed from december 4th until december 15th.
The affected versions were phpMyFAQ 2.6.11 and 2.6.12, both zip and tar.gz package. The attacker
also changed the MD5 files.
Description
The attacker added a backdoor into the file inc/Faq.php in the method getTopTen(). The code was
base64 encoded and first sent an e-mail to a GMail address and added an entry in the faqconfig
table. With this entry, a backdoor was opened to include to include arbitrary PHP code.
Solution
The phpMyFAQ Team will release a new clean phpMyFAQ version 2.6.13. All users of affected
phpMyFAQ versions are encouraged to upgrade as soon as possible to this latest version.
Workaround
If you use phpMyFAQ 2.6.11 or phpMyFAQ 2.6.12 downloaded after december 4th or before december
15th you should change the file inc/Faq.php as soon as possible.