Replies: 3 comments 2 replies
-
The subscribe action only accepts POST requests so these requests will just end up redirecting back, but the fact that they include the form_key is well, scary. |
Beta Was this translation helpful? Give feedback.
2 replies
-
The emails submitted are:
Ref The above check on email would block the subscription regardless of |
Beta Was this translation helpful? Give feedback.
0 replies
-
This issue was fixed in OpenMage. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
In the last 2 days from this IP address 45.227.253.6 all my stores on the newsletter subscription form were attacked. Fortunately, HoneySpam extension did its duty at one point, but the bot managed to bypass the protections for a while (HoneySpam log is huge as size). The GET requests were around 2 - 3/second.
Here are some of the footprints left:
I blocked the whole range of IP's 45.227.253.0/24. The attack came directly to the controller. In one of the servers it added over 9000 lines into the log file, but fortunately the newsletter_subscriber table has no record added by this bot, mainly due to the protection measures taken over the years. As you may see, it bypassed the form key, the mandatory fields and finally it was automatically caught in the firewall by Fail2Ban based on HoneySpam log. If the protections had not been implemented the database table would flood.
What seems interesting to me is that we recently implemented the idea of Form Keys for the newsletter subscription form, which does not exist in Magento. The one who created the bot reads our PR's, but I assure him that he won't surprise me a second time.
Beta Was this translation helpful? Give feedback.
All reactions