Good morning, I suddenly found administrator users on my wordpress site and a plugin called wp-cleansong that I never installed. The site redirects when I browse. How can I solve it?
1
There are 1 best solutions below
Related Questions in WORDPRESS
- How to add the dynamic new rows from my registration form in my database?
- Wordpress Site - pages have low text-HTML ratio
- wordpress delete unwanted location
- How to create a facet for WP gridbuilder that displays both parent and child custom fields?
- How to change woocomerce or full wordpress currency with value from USD to AUD
- error 500 on IIS FastCGI but no clue despite multiple error loggings activated
- Caching private wordpress rest endpoints
- How do i get my close button to work on a popup?
- SQL query to get student enrolled in this month in a course - Moodle
- What wordpress plugin prevent sharing of contact information amongst users?
- Password protected or private URL one-time viewable video access
- Download button not working in wordpress website. How can solve it?
- WP toolkit problem after deleting wordpress site manually
- TypeError: Failed to execute 'arrayBuffer' on 'Blob': Illegal invocation - Insert blob into database
- New Order Email Details Missing // Woocommerce / Woocommerce Bookings
Related Questions in MALWARE
- Persistent Browser Extension Reinstalls Itself: How to Eradicate ‘YOfficeStop’ Permanently on Windows 7?
- USB is not recognized
- Remove Malware wp-cleansong
- Wordpress /wp-admin keeps reloading
- How do I decode malicious PHP code to find out what it does?
- How can I be sure that my keyboard is doing only what it supposed to do?
- Is deleting all partitions on USB is safe?
- PyInstalled my app and now Windows Defender thinks its a trojan? wth
- Can Android Studio be setup as an environment for malware analysis?
- FireEyeSUT Folder on C: Drive
- Raw Shellcode Injection (Quasar Rat)
- XOR encryption in payloads
- Tensorflow .pb file extension blocked by policy - risk of ransomware?
- What does this PowerShell script do? Is it malware? It auto-runs itself on my computer
- Java String Deobfuscation
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
i leave you details about this hack:
Vulnerable plugin: litespeed-cache (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)
Affected Version <= 5.7 Patched Version 5.7.0.1
You can fast check at wp-content/plugins/litespeed-cache/readme.txt
Symptoms:
Creation of admin users Redirects generated by js hooked in wp_head via function clean_header() function Infected core files like wp-blog-header.php Execution:
Attackers can inject arbitrary web scripts into pages that will run when an administrator logs in for the first time in wp-admin. The plugin will in fact be created on exactly the same date and time as login as you can see from the access.log Plane.php point ot a base64 url =base64_decode("aHR0cHM6Ly9kbnMuc3RhcnRzZXJ2aWNlZm91bmRzLmNvbS9zZXJ2aWNlL2YucGhw"); point to hxxps://dns[.]startserv**founds[.]com/service/f.php (blacklisted url)
Sources :
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/litespeed-cache/litespeed-cache-57-reflected-cross-site-scripting-via-nameservers-and-msg
https://www.risorsainformatica.com/rimozione-malware-sito-wordpress/
Malware removal performed on over 1500 websites, of which 30 with this specific attack.
Notes: First detected on February 27, 2024
Prevention: Update to latest version Litespeed cache plugin
HTTP(S) monitoring for /plugins/wp-cleansong/plane.php
Block using htaccess the requests to song and song1
RewriteEngine On
RewriteCond %{QUERY_STRING} song1 [NC,OR]
RewriteCond %{QUERY_STRING} song2 [NC]
RewriteRule ^ - [F]
Also you can block plane.php , wp-cleansong.php and song.php