• Resolved Jake

    (@jakebb)


    You have coding problems that lead to an easy brute force attack on the following files…

    /wp-content/uploads/wpo/server-signature/on/test.php-
    /wp-content/uploads/wpo/add-type/request-me.test-
    /wp-content/uploads/wpo/directory-index/

    In fact the hole wpo file looks to be useless and you where made aware about this 10 months ago?

    wp-content/uploads/wpo/module-loaded/rewrite/content-digest/request-me.txt
    
    contents: “thanks”.
    
    wp-content/uploads/wpo/module-loaded/mime/content-digest/request-me.txt
    
    contents: “thanks”.
    
    wp-content/uploads/wpo/module-loaded/headers/content-digest/request-me.txt
    
    contents: “thanks”.
    
    wp-content/uploads/wpo/module-loaded/headers/content-digest/request-me.txt
    
    contents: “thanks”.
    
    /wp-content/uploads/wpo/content-digest/on/request-me.txt
    
    contents: “hi”

    I mean what’s the point? Unless you love a vulnerable script?

Viewing 2 replies - 1 through 2 (of 2 total)
  • Plugin Contributor Venkat Raj

    (@webulous)

    @jakebb Those files are not useless files, those are used to determine the redirection capability of your server. That said, we are working on a fix to remove the usage of those file.

    Thread Starter Jake

    (@jakebb)

    Well living a server vulnerable to this type of attack is not acceptable! Do better!

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘Vulnerable Script With A Brute Force Attack Problem’ is closed to new replies.