Lvl1.org

25 views
Skip to first unread message

Matt Buckley

unread,
May 10, 2017, 9:54:16 PM5/10/17
to LVL1 - Louisville's Hackerspace

Matt Buckley

unread,
May 10, 2017, 9:57:52 PM5/10/17
to LVL1 - Louisville's Hackerspace
Yep. Looks like the WP installation has been hacked, or maybe Danielle's account. Not sure who maintains the server but let me know if you need help.

Ben Hibben

unread,
May 10, 2017, 10:02:08 PM5/10/17
to lvl1
I'm looking into this.

It looks like there's a URL redirection happening after the page loads.Probably some malicious javascript or XSS.

Blenster

On Wed, May 10, 2017 at 9:57 PM, Matt Buckley <mbu...@gmail.com> wrote:
Yep. Looks like the WP installation has been hacked, or maybe Danielle's account. Not sure who maintains the server but let me know if you need help.

--
You received this message because you are subscribed to the Google Groups "LVL1 - Louisville's Hackerspace" group.
To unsubscribe from this group and stop receiving emails from it, send an email to lvl1+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Ben Hibben

unread,
May 10, 2017, 10:05:11 PM5/10/17
to lvl1
Found the infection - Base64 encoded javascript in the footer.php file.  Removed.

Blenster

Matt B.

unread,
May 10, 2017, 10:18:41 PM5/10/17
to lv...@googlegroups.com
Glad you found it. Any idea how it got in? Is everything up to date? Do you have root access to wherever the site is hosted? 

Ben Hibben

unread,
May 10, 2017, 11:04:22 PM5/10/17
to lvl1
Probably an insecure plugin.

I do not have root.

Everything is up to date.

Blenster

Matt B.

unread,
May 11, 2017, 12:01:47 AM5/11/17
to lv...@googlegroups.com
Looks like one of those plugins hasn't been updated in over two years.

Does another member have root access?  It's possible that the server or VM has packages that aren't up to date and are insecure.

You received this message because you are subscribed to a topic in the Google Groups "LVL1 - Louisville's Hackerspace" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/lvl1/T0p1YasyEko/unsubscribe.
To unsubscribe from this group and all its topics, send an email to lvl1+unsubscribe@googlegroups.com.

Ben Hibben

unread,
May 11, 2017, 12:03:52 AM5/11/17
to lvl1
Root access isn't required.

You'll want to talk to Chris Cprek about the server details I believe.

Blenster

Christopher Cprek

unread,
May 11, 2017, 9:07:14 AM5/11/17
to lvl1
I just looked over it and all packages and plugins are up to date. There was a XSS vulnerability in late January that allowed a post's contents to be overwritten. This seems similar and possibly it's a regression, since I updated WP most recently on Tuesday.

I added another LVL1 admin on Tuesday, but I think that's merely coincidental.  I'll have to audit the logs for clues on the culprit. For the time being, the post has been quarantined.

Ben Hibben

unread,
May 11, 2017, 9:20:44 AM5/11/17
to lvl1
It wasn't on the post; it was in the footer.php file.  That would apply to pretty much any page.  Standard base64 encoded javascript redirect exploit.

Blenster

Tim VanSant

unread,
May 16, 2017, 2:21:27 PM5/16/17
to LVL1 - Louisville's Hackerspace
I use a plug-in called Wordfence Security on some WP sites that I manage. It does a good job of finding and alerting me to potential problems. I have no idea what security measures lvl1 uses on its site, but this might be worth a look.
Reply all
Reply to author
Forward
0 new messages