Timthumb Vulnerability Scanner
Hackers trying to exploit cg-tvs-admin-panel (3 posts)

  1. mikeotgaar
    Posted 3 years ago #

    @Peter Butler - FYI
    I've recently seen hackerbots trying to exploit /timthumb-vulnerability-scanner/cg-tvs-admin-panel.php using requests similar to timthumb attacks e.g.
    So far the only result has been 404 errors.

    Also refer to: plugin-timthumb-vulnerability-scanner-found-vulnerability-in-plugin-directory


  2. Peter Butler
    Plugin Author

    Posted 3 years ago #

    Hey Mike -

    Thanks for the heads up! I think what's going on here is that hackers are scanning the .org plugin repository for any plugin containing a string that matches timthumb (which that file contains, for scanning purposes).

    So - the hackers notice this, and they just add it to their list of plugins they think *might* be vulnerable, then start hitting it.

    I dont anticipate there's any way this presents a real threat (other than annoyance, or extra server load), but I'm certainly open to ideas on how it might - OR ideas on how to prevent hackers from trying to hit htis file, even if it's futile.

  3. mikeotgaar
    Posted 3 years ago #

    @Peter Butler
    I think you are right about the bad guys scanning for strings...
    Agree there's no vulnerability in the plugin - I just ban the IPs used for these annoying resource wasters - easier than a script in htaccess to deny the string lookup. (then get a long list of '403s' in the logs daily - which is amusing) One of the IPs seen trying this also tries GD Stars and theme timthumb attempts
    Most hackers are poor coders anyway - or they'd make more money out of legal work than writing malware bots. LOL

Topic Closed

This topic has been closed to new replies.

About this Plugin

  • Timthumb Vulnerability Scanner
  • Frequently Asked Questions
  • Support Threads
  • Reviews

About this Topic