Support » Plugin: Custom Content Type Manager » Vulnerability on auto-update.php

  • Resolved MartinCDS

    (@martincds)


    Thanks for the great plugin.

    I recently updated a few of my sites and since then my site was hacked. According to my log files the code was injected via custom-content-type-manager/auto-update.php. I navigated there and there is a form input. Please fix this in the next update. I don’t see a reason for an automatic update anyways- this is a known vulnerability by hackers.

    https://wordpress.org/plugins/custom-content-type-manager/

Viewing 9 replies - 1 through 9 (of 9 total)
  • My site has also been hacked. The Hacker was able to create an admin user into the system. Please fix it urgently.

    Our ISP reports that this file was used to upload a malicious /wp-options.php file – it appears as though there is a serious vulnerability in the auto-update.php file, and a script that downloads an arbitrary file without doing any input validation is extremely dangerous.

    This functionality should not be necessary – WordPress provides an update mechanism for plugins already?

    We removed the file from our repository and recommend that anyone else using this plugin do so also.

    Attention: This plugin has a backdoor to upload malicious code to your WordPress website!

    See here for more details: https://blog.sucuri.net/2016/03/when-wordpress-plugin-goes-bad.html

    It also sends your login credentials to the developer… what a crap!

    This WAS a good plugin, but in he past few weeks it has been taken over by a hacker.

    https://blog.sucuri.net/2016/03/when-wordpress-plugin-goes-bad.html

    It’s true, this is a malicious plugin. I was using it for years, but my site was hacked today.

    I hope it will return on the right path, but until then, STAY AWAY!.

    Jon (Kenshino)

    (@kenshino)

    Lord Jon

    The plugin has been manually patched by the plugins Team.

    Version 0.9.8.9 is clean.

    Firstly, reset your passwords, do it for all user accounts. Maybe consider 2 Factor Authentication after that.

    Do yourselves a favour and restore a backup if you have one.

    If you do not, download the WordPress version corresponding to yours from our site and replace the wp-admin and wp-includes folders. https://wordpress.org/download/release-archive/

    Ack. My site was hacked into as well. Note that changing passwords doesn’t help any, since he has modified core code, and it watching all logins, and forwarding them onto the hacker’s website.

    You’ll need to upload the new version before you change the passwords!

    I haven’t looked through the database yet to see if he made any modifications there.

    He actually modified wp-admin/user-edit.php, in order to watch for passwords being changed… 🙂

    I had a site that was victim to this CCTM plugin hack and in cleaning it up found over 100 files that had been added or modified. These files were found in plugin folders, theme folders, upload folders, you name it. If you’re cleaning up after this I would view as suspect any file that was added or changed after you activated the malware version of the CCTM plugin. Search for *.php files in your uploads folders, search for any new folders or files that look suspicious. For example I found a suspect piece of code at the top of this file:
    wp-content/plugins/akismet/views/notice.php
    Hacked files were littered everywhere. Do your due diligence! I found modified/hacked files in the following folders: root, wp-admin, plugins, themes, wp-includes, wp-content/uploads
    I found new suspect files or folders in the following locations:
    root, wp-admin/images/, wp-admin/includes, wp-admin/maint, wp-content/plugins, wp-includes, wp-content/uploads.

    Ugh. GIT version tracker helped us clean it up, but what a mess.

Viewing 9 replies - 1 through 9 (of 9 total)
  • The topic ‘Vulnerability on auto-update.php’ is closed to new replies.