So I’ll post this message here hoping that someone reaches out to me regarding a security hole I’ve found inside Jetpack.
Please provide me with a point of contact.
]]>This plugin is missing a key security feature or enhancement.
It needs to incorporate the ability to detect when someone logs into a website, especially if the person has Administrator privileges. Upon login, the plugin also needs to send an email to the Super Administrator or Primary Administrator.
The above, once incorporated, will help determine if an individual with permanent and/or temporary access rights is abusive, malicious, or leaves the website in a “logged in” state for a long time.
Hoping the above is on the developers mind.
Cheers!
]]>Also same behaviour is that
/wp-content/uploads/ultimatemember/temp
this folder contains suspicious folders and PHP files in them, attacks are often more site-spread, so only suspect remains this plugin.
Can you please look into this issue?
Doesn’t your file upload have a security hole somewhere?
//USING LATEST ULTIMATE MEMBER, LATEST WP//
Also your check_file_upload() method checks extension, not a real file type! Which is an issue itself…
]]>From long time ago, some people tried, they registered irregular coupon to our woocommerce website by remotely (maybe they will use rest api)
And then, they continue to receive illegal discounts.
All coupon name include prefix with sumo (sumo_meoducsaigon, sumo_lnt.nhung0911, sumo_tran,…)
It was relate with sumo reward point plugin? (our website using it)
Rest api should be need more security protect for users.
Please help us.
]]>I love your plugin and use 100 of sites, recently i tested security test and i found a hole.
I am using custom login url, and test with bbpress plugin
When we have give an option to login or register from front website via pop.
i click on forget password and type any wrong credential and submit.
it redirect to me custom url page with message.
so how to modify redirect option?
would i need to use any plugin?, (but i don’t like to add more plugins)
would you plan to add such redirect features in your plugin in next release?
your reply appreciate.
Thank you
https://www.ads-software.com/plugins/encrypted-blog/
]]>I hope that this will help the WordPress devs in finding a security hole and aid in a patch for this.
In the meantime, I had to create 26 diff master passwords, for sites and dbs that are running 3.4.1. I had 3 other sites that are running 3.3.2 that were not affected.
For WordPress Devs, I will provide server and sql logs upon request.
]]>I hope that this will help the WordPress devs in finding a security hole and aid in a patch for this.
In the meantime, I had to create 26 diff master passwords, for sites and dbs that are running 3.4.1. I had 3 other sites that are running 3.3.2 that were not affected.
For WordPress Devs, I will provide server and sql logs upon request.
]]>Tech support at the hosting company claims that the hacker gained access through a security hole in kres.php in the wp-includes directory. They also suggested I upgrade to the latest version of WordPress but I’m already running 2.8.6.
Has anyone else had the same experience?
Paul
]]>