The Attack Is Back…..
Technically… in many cases, it flew under the radar!
Many of you know me as your go-to source for all things WordPress related…
A few weeks back I wrote about a VERY SEVERE vulnerability in a large number of WordPress Themes and Plugins that put you at serious risk of being hacked.
Unfortunately, that post apparently didn’t cover the whole story….
1. Many people did not catch my hint that the file itself may have a variety of file names.
2. Many people only checked their themes and ignored their plugins even though I said plugins were affected.
The real problem however?
At the time there was no good scanner or way for the average Joe/Jane to do diddly squat about it without getting someone like me involved.
Many people were feeling all good about themselves since their active theme looked clean but were in fact still sitting duck and have been dealing with infections left and right all month.
Now there is – and you NEED to go through this process!
Thankfully, Peter from over at Code Garage, has just released TimThumb Vulnerability Scanner Plugin for WordPress.
Not only is the thing smart enough to pick up on many/most of the renamed copies but by golly the thing will even PATCH the files for you!
There is also text-based directions for using the plugin on their website.
Is it possible this could break something?
Yup. However, the risk of that (and the ease of getting your site operational again) are so minute compared to the absolute damage that can be done by you NOT fixing this in your themes and plugins that waiting would be stupid.
[addendum: It has been noted that Thesis may not need patched and that patching it may cause some issues with thumbnail images. I’ve not yet seen this issue but am noting it for you.]
Is it perfect? No. However, I’m really pleased with how it was thought out and its going to catch MOST of the vulnerable files. (All in many cases). Nothings perfect though.
Seriously, as a WordPress pro, I’m asking you to take this risk incredibly seriously and check (or re-check your site). This is NOT a hole that the Dev team can fix by patching the core files because it’s related to something you’ve installed (themes/plugins).
Something as simple as downloading a free theme/plugin from somewhere other than WordPress.org after scanning would also be an easy way to re-introduce the vulnerability.
Want to learn more about the vulnerability itself and why it’s such an issue? Check out my first post on the TimThumb.php Vulnerability.
Contact me if you wish to open as support ticket for assistance with your site.
Your Partner In Online Success
PS: Want to learn more about how to secure WordPress against most hacking and malware attacks? Click here to learn how to defend your blog or WordPress site!
PS: In the unfortunate chance that your site has already been hacked (which may or may not be easily evident to you) for fixing a site affected by hacking or malware, learn more here.