• Index.php hacked and evex.php uploaded.

    Despite having all settings on in Wordfence, this got missed.

    Why?

    Wordfence needs to secure the site from filechanges and prevent uploads from non-users or non-authorized IP addresses.

    Not good enough for supposedly the best security plugin.

    https://wordpress.org/plugins/wordfence/

Viewing 15 replies - 1 through 15 (of 18 total)
  • I have had the same issue with Honey theme. I’m not sure how they got in except maybe because my WooCommerce is outdated.

    WordFence should have prevented these changes from being made.

    Thread Starter grumblenz

    (@grumblenz)

    I have MainWP (Used to use InfiniteWP) and update every site with one click 3 times a week so I can tell you for sure it is not a lack of updating. It’s cheap coders working for theme builders.

    Don’t buy ANY theme from that vendor again because they will be using the same coders.

    Use another theme, change the main username and password on the site.

    Backups I found, were also tainted somehow – Despite a restore from 2 weeks ago, my product slider has never worked again. I will have to rebuild from the ground up.

    I have 8 different security plugins (including Wordfence and Securri) and it went straight past them all. There is a plugin that alerts when ANY file is changed. It’s a pain when you update sites and goes off when anything is done so I stopped using it. Time to dig it out. (File Monitor?)

    It’s also a fundamental flaw in WordPress architecture – It’s a blogging platform wrestled into membership and ecommerce sites.

    Long overdue for a secure ecommerce platform design built properly.

    Thread Starter grumblenz

    (@grumblenz)

    PS – The theme developer was notified 2 months ago by someone else, supposedly fixed it, yet, on a 4 day old updated site, here we go again.

    Enevato/ThemeForest were notified yet continue to sell it.

    *If* the developer fixed it, then themes are a colander – full of holes.

    Remove ALL unused themes and plugins via cPanel (Not just via the dashboard as they still remain on the server and provide access)

    Listen to grumblenz. If you have old themes or plugins, even if they are not used YOU ARE AT RISK.

    We can’t guarantee what a cheap coder has done. If they, as you said, left gaping holes for a hacker to walk through and you continue to use that theme, you are at risk. One of the things I do before purchasing a theme or a downloading a plugin is check the releases dates and the support forums. If I don’t see releases that are recent or I see forum questions that are unanswered for half a year or more, I don’t install it.

    The reality is that wordpress is open source php code, which needs to be kept on top of. I’m not sure if a scan didn’t catch the changes or if this is a commercial theme that we can’t compare code to the original. I checked the Themeforest site but was unable to find a maya theme for wordpress (though I found the html version HERE but that only says he wordpress version is coming. Is this one you adapted?

    tim

    Thread Starter grumblenz

    (@grumblenz)

    My apologies for my shorthand.

    [code]http://themeforest.net/item/mayashop-a-flexible-responsive-ecommerce-theme/2189918[/code]

    MayaShop is a premium theme ($63) from a top author (according to ThemeForest)

    I bought it 3 years ago and have applied all updates regularly. This problem was reported 2 months ago to the developer by someone else. The developer said it was duly fixed.

    I applied updates 4 days ago and was hit 2 days ago.

    The developer suggested I reinstall, check the database etc. (i.e. Start all over again)

    I pointed out the ‘It’s fixed’ claim and asked why I got infected from a 4 day old install. I suggested they have either NOT fixed it (They are lying) OR there are MORE holes in their code.

    I got no reply.

    I will therefore use another theme.

    The coding issue I believe applies to 50% or more of themes because, like Levi Strauss, Ford, Hanes etc. work is outsourced to cheap labour countries to increase profits.

    Graphic designers are rarely coders and vice versa.

    I believe the hackers who used to target MSWindows have now moved on and a new wave of back door attacks and sql injection attacks will escalate rapidly. After 3 years with no issues, I know of 4 in the last 2 months on my/friend’s sites – 5% of sites on a small sample.

    MY OPINION
    WPress REALLY needs to invest in a specific eCommerce version that is paid for and secure. A mangled blog platform is beyond it’s use-by date and we need a proper Apple style rigid architecture with consistent UI and coding / hooks. The current ad-hoc design and inconsistent coding conventions equals the disaster we are now witnessing.

    For what it’s worth, we work well with woocommerce and I think they have some pretty good support (from what I have been told).

    tim

    Skylab from Themeforest has the issue as well and I am not running e-commerce on my site.

    Thread Starter grumblenz

    (@grumblenz)

    @wfsupport

    Working well with Woo is great but a security plugin should provide security. I realise there are many holes to be plugged but protection is the purpose of the plugin.

    It does not (yet) provide protection from nefarious uploads or SQL injection attacks. It needs to as a matter of urgency.

    I agree and we’re always trying to improve, however, we can’t make sure you update your plugins to patch the holes or don’t use insecure themes. If a user doesn’t do what we recommend, then how is the onus of protecting on our shoulders? Running a website, despite what the infomercials tell you, is a job and has certain tasks that one has to perform. Sometimes that includes changing themes altogether if yours has problems. That’s no fun, trust me I know, but if the theme is insecure and lets hackers in, its not a good deal no matter if the theme/plugin was free or paid for. Not if you have to spend the time to de-hack a site. Regardless,its something we can warn you about, but its up to you to pull a trigger and update it

    As for the uploads folder, on my personal sites I have always disabled php execution in it with a htaccess file. Once exploit was enough to make me never want it to happen again. (here’s how I did it, though I changed *.php to *.php* to get those files named something.php.jpg to try and fool me – http://www.wpbeginner.com/wp-tutorials/how-to-disable-php-execution-in-certain-wordpress-directories/)

    Disabling the plugin and theme editor would have helped you as well. This site shows how to do it by just editing your wp-config.php file.
    http://www.wpbeginner.com/wp-tutorials/how-to-disable-theme-and-plugin-editors-from-wordpress-admin-panel/

    Hope this helps,

    tim

    Thread Starter grumblenz

    (@grumblenz)

    Thanks Tim – I quite agree it’s up to the user to keep things up-to-date.

    I use MainWP across all my sites and update 2-3 times a week, so have an expectation higher than the ‘build and forget’ people.

    Perhaps add the ‘No execution in Uploads folder’ as a selectable option in the next iteration of WordFence? Also, include an SQL injection defence – these seem to be the most common issues at present from what I see around.

    TBH – No point in restoring the site as you just restore a vulnerable situation. Rebuild without the hacked plugins and themes as they are likely to be easy targets for a second attempt. Hence struggling with a different slider and a new theme that hates sliders.

    FYI, I had a variant file show up in my website today. evexo.php. GRRRRRRR.

    Thread Starter grumblenz

    (@grumblenz)

    What theme Paula?

    I suggest injection-guard plugin although I did hear that wordfence or sucuri (I can’t remember) has a tickbox to prevent php execution, thus limiting the damage to just uploaded files.

    Just added this request to our dev list for inclusion. Keep watch for this in a future update.

    tim

    Thread Starter grumblenz

    (@grumblenz)

    For the time being, I offer this code. Create a file in wp-upload called .htaccess (use Notepad or cPanel) and paste this code. Should also go in the cache folder. Not 100% security but cuts the risk by 50% at least.

    <FilesMatch “\.(php|php\.)$”>
    Order Allow,Deny
    Deny from all
    </FilesMatch>

    Personally, I believe you should be careful of purchasing any product from a company that doesn’t have any version here at WordPress.org. At least if they have a version here at WordPress.org, you know that they strive to keep up with WordPress standards. Which usually means they pay attention to security. It’s not 100%, but seems to help.

    In regards to the .htaccess code mentioned, that code only prevents access to those files from HTTP. It does not prevent execution. You would need to apply a handler to make that so:
    https://wordpress.org/support/topic/please-fix-disable-php-in-uploads-issue-files-with-php-in-the-name-are-blocked?replies=7

    In all reality, you would be better off whitelisting instead of blacklisting files. Because files with a PHP extension are not the only ones that can be executed.

Viewing 15 replies - 1 through 15 (of 18 total)
  • The topic ‘evex.php uploaded due to Maya theme vulnerability’ is closed to new replies.