tumaykilinc wrote:That is not correct. The sites may have been hacked for a number of reasons. We do not provide infected packages.
No, this is not what i said of course.
I stand corrected, sorry. Given the original post title that was my read.
tumaykilinc wrote:However i experienced this issue on 4 hosting companies with only CMSMS installed on them, and i think there is an exploit to cause this. Each hosting company handled the situation in a different way, most are solved, i did clean installation on all of them. However i request you to look into this issue please, because this can happen again.
Most, if not all, of the Dev Team members work with tons of CMSMS installations, from the pretty simple simple one page sites, to huge and complex sites, from test sites to popular sites with hundreds of hits. We do take seriously all security reports, even though only act upon the valid ones. If this was a CMSMS vulnerability there would be far more reports and, inevitably, we would witness 1st hand the results of such attacks.
A quick search on Google gave me the impression that this is a WP vulnerability, particularly related with a specific plugin.
If this was to be a CMSMS vulnerability we would need far more information than what has been given in any of the posts so far, including but not limited to:
-
System info (CMSMS version, PHP version, etc...);
- server error and access logs;
- list of other scripts installed on the same server;
- Server environment settings;
- etc...
In short: we would need to be able to reproduce the vulnerability in order to solve it.
So far there is no evidence that this is a CMSMS vulnerability.
Additionally, please keep in mind that there are other factors that concur to opening a backdoor to a system:
- other accounts on the same server with vulnerable scripts or otherwise compromised (doesn't have necessarily to be on the same account);
- site developers with infected computers (possible viruses, trojans and keyloggers);
Also please remember that, after recovering a site from a backup, additional measures should be taken to ensure that the system cannot be further compromised:
- change
ALL passwords, for FTP, cPanel, administrator accounts and make sure you do not have any FTP accounts on your server that should not be there at all;
- update CMSMS and 3rd party modules to the latest versions;
- try to implement our
security suggestions;
- update and secure other scripts or web applications that might be running on your server;
HTH