PriMoThemes — now s2Member® (official notice)

This is now a very OLD forum system. It's in READ-ONLY mode.
All community interaction now occurs at WP Sharks™. See: new forums @ WP Sharks™

Possible registration vulnerability

s2Member Plugin. A Membership plugin for WordPress®.

Possible registration vulnerability

Postby FrasSmith » May 20th, 2011, 12:21 am

I'm using S2Member 3.5.8 on Wordpress 3.1.2 and I have been allowing free subscribers to my site.

In my registration page, I capture some custom fields, one of which is a drop down list so a value will always be supplied.

Late yesterday, I noticed a sudden spike in registration activity, I received ten new members in the space of an hour or so. My stats didn't seem to have recorded enough traffic to justify the new members.

On further investigation I found that none of the new members had any of my S2Member custom fields populated so they cannot have gone through the standard registration page.

I locked the site down overnight (password protected the directory). This morning, I opened it up again and within 5 minutes, I had another 2 registrations.

Clearly there's a bot working somewhere and bypassing the normal registration to create these new users.

It would also seem clear that there must be some vulnerability on the site that is allowing these automated registrations to take place.

I don't know if this is an S2Member issue or a Wordpress issue, but, I thought it best to report it to both parties, because it is an issue.

In the interim, I've disabled free user registration in S2Member and the problem has stopped.

best regards
Fraser
User avatar
FrasSmith
Registered User
Registered User
 
Posts: 2
Joined: May 20, 2011

Re: Possible registration vulnerability

Postby drbyte » May 20th, 2011, 2:15 am

This topic was discussed in Joomla Forums but I think WordPress do have the same issue

"I believe the the purpose of sending bogus registrations is to harvest the email address stored in Global Configuration -> Server, which many people use as the site admin address (a high value target).

Once the address is know it is spammed to try and harvest the admin's email address book and or proliferate other nasty stuff on the admin's machine. To try and defend against this I use a no-reply email address in Global Configuration -> Server for bogus registrations that get through form validation."

"Captcha can be defeated by a well written bot or more likely "liveware" (a person) that is trying to hack your site. To try and eliminate the bot's make sure the captcha is not too easily determined. Try switching image types. Stopping a person requires other measures - tracking IP, form validations to try and get has much validate info as possible."

"At the end of the day we ended up reworking our registration form to force JavaScript input validation, plus PHP input validation on the server and token check. After making these changes bogus registration stopped. We don't use any addition components - e.g. filters, CAPTHCA, etc.."

For WordPress this plugin might come handy but not sure how it will work with S2M
[url]TTC User Registration Bot Detector[/url]

Sam
User avatar
drbyte
Experienced User
Experienced User
 
Posts: 269
Joined: May 6, 2010

Re: Possible registration vulnerability

Postby Jason Caldwell » May 23rd, 2011, 4:29 am

Hi Sam!

@FrasSmith:
s2Member Pro Forms come with a built-in Captchya Code,
which can be enabled with a Pro Form Shortcode attribute.
captcha="clean" When you set this Attribute, visitors must prove they're human by typing a captcha/security code. Possible values: 0 = do NOT require a captcha code on this Form; clean = DO require a captcha code on this Form; using the clean theme style. Possible theme styles include: red, white, clean, and blackglass. This service is powered by Google's reCaptcha system.

For the free version of s2Member, we have tested this plugin, which seems to cover all the areas that s2Member does not. In fact, we decided not to add Captchya boxes into the basics of WordPress, just so that site owners would have the flexibility to choose the security mechanism they prefer ( i.e. through a plugin ). http://wordpress.org/extend/plugins/si- ... wordpress/
~ Jason Caldwell / Lead Developer
& Zeitgeist Movie Advocate: http://www.zeitgeistmovie.com/

Is the s2Member plugin working for you? Please rate s2Member at WordPress.org.
You'll need a WordPress.org account ( comes in handy ). Then rate s2Member here Image
.
User avatar
Jason Caldwell
Lead Developer
Lead Developer
 
Posts: 4045
Joined: May 3, 2010
Location: Georgia / USA

Re: Possible registration vulnerability

Postby FrasSmith » May 23rd, 2011, 8:35 am

Thanks for the answers. I already had SI Captcha on my registration form, it wasn't doing any good. I switched to Google's reCaptcha, it didn't stop the spam registrations either. I've now switched to SABRE which combines captcha, dns lookup, form fill timing (i.e. if it's less than 10 seconds its a script). SABRE seems to be much more successful although a few still managed to get through.

I'm still not sure how my registration form is being bypassed, i.e. how compulsory S2 custom fields that always have a value, don't get saved with these spam registrations, but, at least I am now stopping more than 90% of them and can trace the others to manually deal with them.
User avatar
FrasSmith
Registered User
Registered User
 
Posts: 2
Joined: May 20, 2011

Re: Possible registration vulnerability

Postby dapike » November 25th, 2011, 7:25 am

I too have recently been experiencing bogus registrations that somehow have no data entered into the mandatory registration fields. After checking the html access logs for my site, it looks as though these are somehow happening when a URL ending as follows gets used:

/wp-login.php?checkemail=registered

I'm not yet sure how to close the loophole that these bogus registrants are exploiting, so I would welcome suggestions.

- David.
User avatar
dapike
Registered User
Registered User
 
Posts: 9
Joined: October 5, 2010

Re: Possible registration vulnerability

Postby dapike » November 25th, 2011, 9:26 am

Hmmm... upon further investigation, it looks like the /wp-login.php?checkemail=registered URL might simply reflect the bogus registration being successfully processed. I remain baffled as to just how these registrations are being accepted without entering data into the mandatory fields on the registration form.

- David.
User avatar
dapike
Registered User
Registered User
 
Posts: 9
Joined: October 5, 2010


Return to s2Member Plugin

Who is online

Users browsing this forum: Yahoo [Bot] and 2 guests

cron