• Resolved Gans-S

    (@gans-s)


    Good job!

    Do you know, your plugin is used in site hacking?
    They use this address:
    /wp-content/plugins/sell-downloads/sell-downloads.php?file=../../../wp-config.php
    This is about 131-136 lines of sell-downloads.php V 1.0.17, I think:
    `$f_url = $_REQUEST[‘file’];
    $f_content = @file_get_contents($f_url);
    if($f_content !== false){
    $f_name = substr($f_url, strrpos($f_url, ‘/’)+1);
    header(‘Content-Disposition: attachment; filename=”‘.$f_name.'”‘);
    print $f_content;
    }`

    And I am very glad!… Because i don’t use plugin.

    https://wordpress.org/plugins/sell-downloads/

Viewing 1 replies (of 1 total)
  • Plugin Author codepeople

    (@codepeople)

    Hi,

    The code you are referring cannot be used for hacking your website, because the code is protected by a conditional statement with the following query as the condition:

    $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM $wpdb->prefix".SDDB_POST_DATA." WHERE demo=%s", $_REQUEST[ 'file' ] ) )

    So, the code will be execute only if there is a file as product’s demo with the URL: “../../../wp-config.php”, that is not the case.

    Best regards.

Viewing 1 replies (of 1 total)
  • The topic ‘Plugin & sites?’ is closed to new replies.