latest stable versions: v150827 (changelog)

Old Forums (READ-ONLY): The community now lives at WP Sharks™. If you have an s2Member® Pro question, please use our new Support System.

Hackers trying to execute s2Members-o-.php

Home Forums Community Forum Hackers trying to execute s2Members-o-.php

This topic contains 5 replies, has 3 voices. Last updated by  Suhaib Siddiqi 4 years, 2 months ago.

Topic Author Topic
Posted: Friday Oct 5th, 2012 at 8:08 am #27569

I noticed since few days some hacker from Thailand had been trying to execute s2members-o.php and s2members css remotely. ZB Block from spambotsecurity.com had blocked the attempts. I thought to post a note on this forum to investigate possible vulnerabilities?
Below is a snip from ZBBlock log file.

#: 234 @: Fri, 05 Oct 2012 02:22:00 -0500 Running: 0.4.10a1

Host: ppp-110-168-252-42.revip5.asianet.co.th

IP: 110.168.252.42

Score: 1

Violation count: 2 

Why blocked: Bothost / Fake ISP (HN-040). 

Query: ws_plugin__s2member_css=1&qcABC=1&ver=120703-120703-1629152630

Referer: http://www.shaadiconnections.com/

User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; InfoPath.3)

Reconstructed URL: http:// www.shaadiconnections.com /wp-content/plugins/s2member/s2member-o.php?ws_plugin__s2member_css=1&qcABC=1&ver=120703-120703-1629152630

List Of Topic Replies

Viewing 5 replies - 1 through 5 (of 5 total)
Author Replies
Author Replies
Posted: Saturday Oct 6th, 2012 at 7:23 am #27638

Thanks Suhaib!

Jason took care not to leave vulnerabilities in the script, but I’ll report this to him so he can review it once more if needed. :)

Posted: Saturday Oct 6th, 2012 at 7:33 am #27641

Thanks Cristian,

I noticed in log file, a couple Russian hackers also tried same query remotely. Looks like some hackers know someting about it? Anyway, I feel safe, because ZBBlocck instantly ban anyone who try to execute queries remotely.

Posted: Sunday Oct 7th, 2012 at 11:39 am #27722

I did a little search on this issue. This issue was discussed on your free plugin public forum in 2011 Q1. Anyone can execute http://www.example.com/wp-content/plugins/s2member/s2member-o.php?ws_plugin__s2member_js_w_globals=1&qcABC=1&ver=120703-120703-1784216801
It shows data in the browser, even though not sensitive, but public, and logout users should not be able to see it in browser by executing remote query. It gives hackers an option to look for exploitable look holes, and it also displays the email address, which spammers collect to spam. This should be fixed.

Posted: Monday Oct 15th, 2012 at 11:42 pm #28489
Staff Member

Thanks for the heads up on this thread.

Regarding s2member-o.php. This file has one job, and that is to load the WordPress framework with ONLY the s2Member plugin, and not with any other plugins running. This allows s2Member to load it’s dynamic JavaScript/CSS files through WordPress, but without the lag associated with other plugins/themes running on a site. This is an important feature to keep your site efficient in modern browsers.

As for security issues. There are no security issues that I’m aware of. In practice, loading s2member-o.php, is very much the same as loading the index.php file that ships with WordPress. It has the ability to load WordPress for logged-in users, and also for the public; this is by design.

If you have found a security issue with s2member-o.php, please report the specifics of that issue, indicating the way in which your site was hacked, and what data was compromised, and how.

Posted: Tuesday Oct 16th, 2012 at 9:00 am #28522

Jason,

I am not aware of specific security issues. However, I do see hacking attempts on daily basis from China, India, Russia and Ukraine. All of those hackers try the string http://www.example.com/wp-content/plugins/s2member/s2member-o.php?ws_plugin__s2member_js_w_globals=1&qcABC=1&ver=120703-120703-1784216801. Therefore, I assume that there is something known to hackers about it. I have ZBBlock from spambotsecurity.com installed, which blocks these kind of remote queries. My ZBBlock log files have over 100 these querries from various hackers.

Viewing 5 replies - 1 through 5 (of 5 total)

This topic is closed to new replies. Topics with no replies for 2 weeks are closed automatically.

Old Forums (READ-ONLY): The community now lives at WP Sharks™. If you have an s2Member® Pro question, please use our new Support System.

Contacting s2Member: Please use our Support Center for bug reports, pre-sale questions & technical assistance.