Forum Replies Created

Viewing 10 replies - 1 through 10 (of 10 total)
  • Thread Starter hallipa

    (@hallipa)

    Ah mate, that did it. It must have to do with how I was rendering the rest of the page.

    Thank you very much for a flawless plugin and your quick answer!

    Hm. Last version of the plugin (2.3.2) seems to be working fine out of the box.

    Thanks.

    I’ve got this same problem. It works fine if I change it manually.

    Here’s what it says when I try to activate the plugin (has double-slash in the path):

    Warning: require_once(/data2/var/www/vhosts/[mydomain].com/httpdocs/wp-content/cimy-user-extra-fields//cimy_uef_email_handler.php) [function.require-once]: failed to open stream: No such file or directory in /data2/var/www/vhosts/[mydomain].com/httpdocs/wp-content/plugins/cimy-user-extra-fields/cimy_user_extra_fields.php on line 169

    I put your code into single.php and here is the info it outputs:

    /data2/var/www/vhosts/[mydomain].com/httpdocs/wp-content/themes/DimeSpring/single.php

    /data2/var/www/vhosts/[mydomain].com/httpdocs/wp-content/themes/DimeSpring

    themes/DimeSpring

    Thanks a lot.

    +1.

    Forum: Fixing WordPress
    In reply to: Got Hacked 12/08

    OK, the solution for the extraneous div added to the pages is listed here: https://www.bluehostforums.com/showthread.php?t=15360

    Here’s what happens. A vulnerable file on your server (it can be anywhere, even on a different domain, like in my case) writes the bad code into your WordPress files. Here’s how to get rid of it.

    Look for eval(base64_decode in your WP files. In my case, it appeared in 206 cases, of which 194 looked like this:

    <?php /**/eval(base64_decode('crazy-looking-code-here')); ?>

    Copy the code between the quotes in the parentheses and go here to decode it: https://www.opinionatedgeek.com/dotnet/tools/Base64Decode/

    In the decoded script, you will see a path to the bad file on your server that is writing the extraneous div code into your files. In my case it was on a different domain on the same box, in an old backup folder. It was a phpBB mod from many years ago. For other people it’s Gallery2 or some software other package.

    Find that file and either upgrade it to a non-vulnerable version or delete it, like I did.

    Finally, you will have to remove the code that the rogue file has already written into your WordPress files. In my case it was in 194 files that it has been inserted.

    So get all your files from the server, and do a find and replace for the bad code, which should look like above, just that much longer.

    This code will bulk-update authors for all posts with a specific author, (e.g. attribute all posts by author 1 to author 2). Keep in mind that it’s very rudimentary and you should follow the instructions carefully.

    – copy all the code below into a new file
    – edit the variables in it, as indicated in the instructions in the code
    – save it as a .php file and upload it to the root directory of your blog
    – run it in your Web browser

    Good luck.

    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "https://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
    <html xmlns="https://www.w3.org/1999/xhtml">
    <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <title>Untitled Document</title>
    </head>
    
    <body>
    <?php
    
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /***** BACK UP YOUR DATABASE BEFORE RUNNING THIS FILE! ****/
    /* Thank you. */
    
    /* THIS PAGE WON'T SHOW ANY WARNING OR CONFIRMATION WHEN YOU RUN IT, JUST A BLANK PAGE. EVERYTHING HAPPENS IN THE BACKGROUND */
    
    /*
    ----------
    HOW TO USE
    ----------
    
    1. Modify the variables below
    2. Upload this file to your blog's root directory
    3. Open your browser and run this file
    
    Once you made sure it did what it needed to do, delete this file off of your server, so it doesn't get executed by mistake by some robot or another user and mess up your authors in the future.
    */
    
    // Enter your database username, pass, hostname and database name below. You can find these at the top of the wp-config.php file in your blog's root directory. 
    
    $username = "";
    $password = "";
    $hostname = "";
    $dbname = "";
    
    // REPLACE 1 WITH THE AUTHOR ID TO BE REPLACED
    $current_author = "1";
    
    // REPLACE 2 WITH THE NEW AUTHOR ID
    $desired_author = "2";
    
    // STOP MODIFYING HERE, UPLOAD AND RUN THIS FILE. GOOD LUCK.
    
    $dbh = mysql_connect($hostname, $username, $password) or die("Unable to connect to MySQL");
    mysql_select_db($dbname);
    
    mysql_query("UPDATE wp_posts SET post_author='$current_author' WHERE post_author='$desired_author'")
    ?>
    
    </body>
    </html>
    hallipa

    (@hallipa)

    Mind if I ask how? I’m having the same issue. Thanks.

    Forum: Plugins
    In reply to: Tell A Friend

    This is the best one I found, works wonderfully: https://dev.wp-plugins.org/wiki/wp-email

    Forum: Plugins
    In reply to: email to friend

    Just wanted to say this is a badass plugin and express my thanks to GamerZ for it. Works a charm.

    I’m looking for the exact same capability. A form similar to the comments form where users can submit posts, without having an account.

    If I create a Contributor account with public access, then users will have access to the profile of that account and I don’t want that.

    Any help is appreciated.

Viewing 10 replies - 1 through 10 (of 10 total)