Compromised Site
-
An exploit in Updraft 1.12.30 (and possibly previous versions) allows a remote user to take advantage of code within Updraft to execute eval commands, creating a post.php file in the root folder with code that facilitates the remote user to gain access to a variety of functions including mail() execution.
One of the files affected is updraftplus/vendor/composer/files.php
Thankfully, I use NewRelic to monitor my server and was able to catch this security breach quickly, however, not before thousands of emails flowed through my network. To the developers of UpdraftPro, your users deserve an explanation as to why this occurred and why this fraudulent code was released.
[topic title adjusted by moderator]
The topic ‘Compromised Site’ is closed to new replies.