Viewing 2 replies - 1 through 2 (of 2 total)
  • Plugin Author Peter Butler

    (@peterebutler)

    Hey Mike –

    Thanks for the heads up! I think what’s going on here is that hackers are scanning the .org plugin repository for any plugin containing a string that matches timthumb (which that file contains, for scanning purposes).

    So – the hackers notice this, and they just add it to their list of plugins they think *might* be vulnerable, then start hitting it.

    I dont anticipate there’s any way this presents a real threat (other than annoyance, or extra server load), but I’m certainly open to ideas on how it might – OR ideas on how to prevent hackers from trying to hit htis file, even if it’s futile.

    Thread Starter mikeotgaar

    (@mikeotgaar)

    @peter Butler
    I think you are right about the bad guys scanning for strings…
    Agree there’s no vulnerability in the plugin – I just ban the IPs used for these annoying resource wasters – easier than a script in htaccess to deny the string lookup. (then get a long list of ‘403s’ in the logs daily – which is amusing) One of the IPs seen trying this also tries GD Stars and theme timthumb attempts
    Most hackers are poor coders anyway – or they’d make more money out of legal work than writing malware bots. LOL

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘Hackers trying to exploit cg-tvs-admin-panel’ is closed to new replies.