latest stable versions: v150827 (changelog)

Old Forums (READ-ONLY): The community now lives at WP Sharks™. If you have an s2Member® Pro question, please use our new Support System.

About: Scott Paley

Sorry, I've not written a description yet. I'll get to it soon!


Topics I'm Subscribed To

Viewing topic 1 (of 1 total)
Topic Count Last Reply
Possibly SQL Injection issue

By:  Scott Paley in: Community Forum

voices: 4
replies: 20

4 years ago  Jason (Lead Developer)

Viewing topic 1 (of 1 total)

Topics I've Started

Viewing topic 1 (of 1 total)
Topic Count Last Reply
Possibly SQL Injection issue

By:  Scott Paley in: Community Forum

voices: 4
replies: 20

4 years ago  Jason (Lead Developer)

Viewing topic 1 (of 1 total)

My Latest Replies (From Various Topics)

Viewing 13 replies - 1 through 13 (of 13 total)
Author Replies
Author Replies
Posted: Friday Jan 4th, 2013 at 3:19 pm #36185
Scott Paley
Username: spaley

Can I please get an update on this query?

Posted: Wednesday Jan 2nd, 2013 at 7:15 am #35964
Scott Paley
Username: spaley

Jason –

The s2member-pro Veracode report shows 2 code injection issues at the file s2member-pro\includes\classes\login-widget.inc.php.

It uses $_SERVER[“REQUEST_URI”] in raw form to echo it out in HTML (into an field and into a link).

The value of $_SERVER variables can’t be trusted, as it can be tampered by the end user.

This is why the WP core uses the esc_url() function whenever WP needs to use REQUEST_URI.
You’re using esc_attr instead, which doesn’t seem to provide enough URL cleaning, and thus open this input for XSS.

Could you comment on this?

Posted: Monday Dec 31st, 2012 at 1:46 pm #35859
Scott Paley
Username: spaley

Jason – thank you so much for your thoroughness. I’ll be passing your findings on to our security team. I have not yet gotten the results of the dynamic scan, but if anything turns up that seems due to s2member, I’ll let you know.

Really appreciated and happy new year!

Posted: Friday Dec 28th, 2012 at 2:39 pm #35656
Scott Paley
Username: spaley

Just to be clear about the scan. We uploaded all of our source code to Veracode, which has some method of analyzing all the code and finding security holes. The output of that was what raised our alarms.

The dynamic scan we’ll run over the weekend is more like Selenium. It’ll actually mimic a user trying to break the site from the front-end. I’ll be happy to share those results as well.

And of course, the manual scan is literally a human being trying to hack the site via methods like SQL injection, XSS, or other nefarious means.

Posted: Friday Dec 28th, 2012 at 2:24 pm #35654
Scott Paley
Username: spaley

FYI, it’s possible we’ll have time to do a manual scan as well over the weekend. We are having Veracode run a dynamic scan to get additional results, but it may take a few days to get the report on that.

Posted: Friday Dec 28th, 2012 at 2:18 pm #35653
Scott Paley
Username: spaley

Thanks Jason,

I just sent the reports. I’m sure you take security very seriously, which is why I brought this to your attention immediately. I’d be thrilled if you could prove to me these are all false positives, but if not, we really need these fixed urgently (as I’m sure do many of your users.)

Posted: Friday Dec 28th, 2012 at 12:37 pm #35642
Scott Paley
Username: spaley

Adding “security” as a tag.

Posted: Friday Dec 28th, 2012 at 12:35 pm #35641
Scott Paley
Username: spaley

Thanks – will try that.

Posted: Friday Dec 28th, 2012 at 12:30 pm #35638
Scott Paley
Username: spaley

BTW – at first glance, one of my developers is telling me that these look like real issues. He wrote, “I haven’t tried to actually exploit them, so I’m not 100% positive, but it definitely looks like user input that’s not being sanitized.”

Posted: Friday Dec 28th, 2012 at 12:28 pm #35637
Scott Paley
Username: spaley

Yes, I agree with you. I’m hoping it’s all just false positives. But… the network won’t sign off on the website until we can either prove it’s a false positive, or if it’s not, that it gets fixed.

And if it really IS an issue, it’s a pretty major issue that will affect all s2member websites and really should be fixed urgently.

Posted: Friday Dec 28th, 2012 at 12:23 pm #35635
Scott Paley
Username: spaley

On your last question about shutting off other plugins, for these 2 reports I ONLY uploaded the 2 plug-in folders (s2member and s2member-pro). There are no other plugins, or even WordPress itself, involved here.

Posted: Friday Dec 28th, 2012 at 12:22 pm #35634
Scott Paley
Username: spaley

David – I’m not certain. It’s a static scan, not done manually. It’s entirely possible it’s found some “false positives.”

That said, this is certainly an urgent concern for us and I’d imagine for s2member as well.

Posted: Friday Dec 28th, 2012 at 12:19 pm #35630
Scott Paley
Username: spaley

The second report just came in and reported 196 possible code injection flaws, 4 XSS flaws, and several other smaller issues.

Again, please let me know how I can provide you with the specific information in a private way.

Viewing 13 replies - 1 through 13 (of 13 total)

Old Forums (READ-ONLY): The community now lives at WP Sharks™. If you have an s2Member® Pro question, please use our new Support System.

Contacting s2Member: Please use our Support Center for bug reports, pre-sale questions & technical assistance.