- This topic has 7 replies, 2 voices, and was last updated 5 years, 7 months ago by Trevor.
-
Anonymous(Private) May 13, 2019 at 11:12 am #210903
One of the security scanning services we use on our site just sent us a warning saying that it found a Known Exploit Fingerprint Match in our /public_html/wp-content/plugins/search-filter-pro/admin/assets/js/class.plugin-modules.php file.
On looking in this file, we can see a pile of references to a site called http://www.garors.com (some lines are live and some are commented out).
Can anyone here confirm if this is expected?
Anonymous(Private) May 13, 2019 at 11:36 am #210916G’day Trevor,
Thanks for the quick reply.
Hmm, I just checked and we didn’t seem to have received any notices about renewing, so I have just manually logged in and renewed the support.
We are running v2.4.5
I have uploaded the file in question here: https://1drv.ms/u/s!AkVfqWByhngGiJEb31ix0mM-UirMBQ
Let me know if there is any other data I can help provide.
Many thanks,
Nigel
Anonymous(Private) May 13, 2019 at 12:27 pm #210938Oh, no!
It appears that the 3 x folders that are infected on our server are all search-filter-pro folders.
search-filter-pro/admin/class.plugin-modules.php
search-filter-pro/admin/assets/js/class.plugin-modules.php
search-filter-pro/admin/assets/css/class.plugin-modules.phpCan you please assist with how this injection might have happened on our server as it appears to have come in through the SFP plugin.
Anonymous(Private) May 14, 2019 at 1:19 am #211029Hi Trevor – we have found the root cause of this and thought you might want to know.
Whilst troubleshooting the problems we are having with Search Filter Pro (another ticket that Ross is working on), one of our developers downloaded the latest version of the plugin and uploaded it to our site.
However, the problem is that he downloaded it from a site other than yours which is currently hosting an infected version of your plugin zip file.
You can replicate what happened by:
1) Going to Google
2) Searching for “download search filter pro”
3) The first result (at least for us) is from downloadfreethemes.co
4) Download the file in a sandbox environment
5) You will see that extracted zip file has the 3 x extra malicious files stored in thereNot sure if there’s anything you can do about it on your end aside from reporting the site to Google as hosting illegitimate versions of your software, but thought you would like to know.
Let us know if you need any more information.
-
AuthorPosts