Hackers are exploiting vulnerabilities in wiki software packages to establish networks of compromised computers.
Software bugs in Pmwiki and Tikiwiki software applications are being actively used to create botnets, the SANS Institute's Internet Storm Centre reports.
It reckons the exploits in Tikiwiki 1.9 (and below) and Pmwiki version 2.1.19 (and below) are the work of the same virus writer. Both Tikiwiki and Pmwiki are software packages that allow the creation of wikis - web applications that allow surfers to easily add, remove, or edit the content of collaborative websites.
The Pmwiki exploit can only be exploited where the "Register_globals" attribute is enabled. However, the Tikiwiki exploit can be exploited regardless of this setting.
As well as loading an IRC bot that connects to different channels to access to Undernet IRC servers, attackers are also loading a variety of other exploits and attack tools on the compromised machines. Alongside Perl flood scripts, useful for launching denial of service attacks, exploits for both 2.4 and 2.6 Linux kernels are also being loaded onto vulnerable machines.
Pmwiki users are advised to upgrade to guard against attack. Tikiwiki has published an advisory explaining a workaround designed to guard against attack, pending the availability of software patches.
No responsibility can be taken for the content of external Internet sites.