April 12, 2006
Online Terrorists Attack Blogger (Again)
Aaron is the victim of online terrorism...again. He's been put on a hit list at jihadi websites because of his over-the-top mocking of Mohammed. I'm soo jealous. Here's a screenshot of his website now. Good luck in getting it back up. Thanks to The National Institute of Truth for the tip.
Comments are disabled.
Post is locked.
Update: Egyptian Sandmonkey has a translation of the original message left by the infamous al3isnet crew the other day.
Posted by: Rusty at
07:08 AM
| Comments (4)
| Add Comment
Post contains 80 words, total size 1 kb.
1
Darn, I'm so jealous! *posts pic of the prophet mohammed spanking his monkey* That should do it!
Posted by: Princess Kimberley at April 12, 2006 09:32 AM (7b8BZ)
2
Mwahahahahahahaha. "install.php" hahahahahahahahahaha
Posted by: caltechgirl at April 12, 2006 11:49 AM (jOkK0)
3
Aaron:
I'm subscribed to several of the software vulnerability tracking lists, and this was sent to one of them in March:
Severity: Normal
Title: WordPress: SQL injection vulnerability
Date: March 04, 2006
Bugs: #121661
ID: 200603-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
WordPress is vulnerable to an SQL injection vulnerability.
Background
==========
WordPress is a PHP and MySQL based content management and publishing
system.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-apps/wordpress = 2.0.1
Description
===========
Patrik Karlsson reported that WordPress 1.5.2 makes use of an
insufficiently filtered User Agent string in SQL queries related to
comments posting. This vulnerability was already fixed in the
2.0-series of WordPress.
Impact
======
An attacker could send a comment with a malicious User Agent parameter,
resulting in SQL injection and potentially in the subversion of the
WordPress database. This vulnerability wouldn't affect WordPress sites
which do not allow comments or which require that comments go through a
moderator.
.........
I'm not sure if you had patched that or not, but
Your sites current state, made me wonder if they did not inject a "DROP" statement, to delete your database.
Posted by: davec at April 12, 2006 09:02 PM (CcXvt)
4
I'm back.
Posted by: Aaron's cc: at April 18, 2006 06:00 AM (ov6Vw)
19kb generated in CPU 0.0235, elapsed 0.1456 seconds.
119 queries taking 0.1367 seconds, 253 records returned.
Powered by Minx 1.1.6c-pink.
119 queries taking 0.1367 seconds, 253 records returned.
Powered by Minx 1.1.6c-pink.