Good pickup. Removed :)
More info
http://wordpress.org/development/2008/02/wordpress-233/
john
John Allsopp
style master :: css editor :: http://westciv.com/style_master
about me :: http://johnfallsopp.com
Web Directions Conferences :: http://webdirections.org
My Microformats book :: http://microformatique.com/book
thought they'd fixed this problem with 2.3.3 -
john
But might be something else all together...
What version of Apache is it running? Maybe upgrade to latest version
(if you're running your own slice/vm)?
What version of PHP?
What are the access rights on the files and folders?
Are there any additional WP themes installed?
One of my hosts, MediaTemple, updated their php installations in January:
"There is a parameter for php called 'allow_url_fopen' that is
currently enabled in both our PHP4 and PHP5 environments. If the
proper precautions are not taken in PHP a large number of code
injection vulnerabilities frequently reported in PHP-based web
applications are possible. We understand that our customers install a
great number of PHP-driven applications, many of them from the
open-source community. Unfortunately a great number of them can
potentially fall prey to these vulnerabilities. "
Has this been disabled on your server (allow_url_fopen can be found in php.ini)?
While you're at it, have a look at register_globals and turn that off too...
(Djee, I better have another look at my WP installation too...)
JJ
--
Jean-Jacques Halans
================================
> http://www.halans.be
> http://del.icio.us/halans
> http://www.flickr.com/photos/halans/
> http://halans.vox.com/
> http://www.redcrates.com/
> http://www.mapanui.com/
================================
In case someone has injected some code into it somewhere ?
Just a suggestion.