The PHP Group has confirmed the compromise of its servers over the weekend.
It issued a statement that said its wiki.php.net box was compromised and attackers were able to collect wiki account credentials.
It said in a statement: “No other machines in the php.net infrastructure appear to have been affected. Our biggest concern is of course, the integrity of our source code.
“We did an extensive code audit and looked at every commit since 5.3.5 to make sure that no stolen accounts were used to inject anything malicious. Nothing was found. The compromised machine has been wiped and we are forcing a password change for all SVN accounts.”
It said that it is continuing to investigate the details of the attack, which combined a vulnerability in the wiki software with a Linux root exploit.
The compromise was confirmed by the vulnerability research company Vupen over the weekend. Vupen, who recently broke the Apple Safari browser at the pwn2own contest at the recent CanSecWest event, said on its Twitter feed that the PHP Group had confirmed the compromise of its servers over the weekend.
CanSecWest spokesperson ‘Dragosr' said on his Twitter feed that the PHP hack could affect 25,388,331 websites overall and 33 per cent of the top million websites.