Version Description
Download this release
Release Info
Developer | donncha |
Plugin | Exploit Scanner |
Version | 0.3 |
Comparing to | |
See all releases |
Code changes from version 0.2 to 0.3
- exploit-scanner.php +7 -9
- readme.txt +3 -1
exploit-scanner.php
CHANGED
@@ -3,16 +3,13 @@
|
|
3 |
Plugin Name: WordPress Exploit Scanner
|
4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
5 |
Description: Scans your WordPress site for possible exploits
|
6 |
-
Version: 0.
|
7 |
Author: Donncha O Caoimh
|
8 |
Author URI: http://ocaoimh.ie/
|
9 |
*/
|
10 |
|
11 |
function exploit_init() {
|
12 |
-
global $md5_list;
|
13 |
add_action('admin_menu', 'exploit_config_page');
|
14 |
-
if( is_admin() )
|
15 |
-
include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
|
16 |
}
|
17 |
add_action('init', 'exploit_init');
|
18 |
|
@@ -23,7 +20,7 @@ function exploit_config_page() {
|
|
23 |
}
|
24 |
|
25 |
function exploit_admin_page() {
|
26 |
-
global $suspicious_files, $
|
27 |
if( !current_user_can( 'manage_options' ) )
|
28 |
wp_die( 'Not allowed here!' );
|
29 |
?><div class="wrap">
|
@@ -73,8 +70,9 @@ function exploit_admin_page() {
|
|
73 |
}
|
74 |
|
75 |
function search_install( $directory, $text ) {
|
76 |
-
global $suspicious_files, $
|
77 |
set_time_limit( 60 );
|
|
|
78 |
|
79 |
if(is_dir($directory)) {
|
80 |
$directory = trailingslashit( $directory );
|
@@ -120,10 +118,10 @@ function hilight_text( $contents, $text ) {
|
|
120 |
}
|
121 |
|
122 |
function file_search( $suspect_text = '' ) {
|
123 |
-
global $suspicious_files, $
|
124 |
|
125 |
-
if ( (int) @ini_get('memory_limit') <
|
126 |
-
@ini_set( 'memory_limit', '
|
127 |
$suspicious_files = array();
|
128 |
if( $suspect_text == '' )
|
129 |
$suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
|
3 |
Plugin Name: WordPress Exploit Scanner
|
4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
5 |
Description: Scans your WordPress site for possible exploits
|
6 |
+
Version: 0.3
|
7 |
Author: Donncha O Caoimh
|
8 |
Author URI: http://ocaoimh.ie/
|
9 |
*/
|
10 |
|
11 |
function exploit_init() {
|
|
|
12 |
add_action('admin_menu', 'exploit_config_page');
|
|
|
|
|
13 |
}
|
14 |
add_action('init', 'exploit_init');
|
15 |
|
20 |
}
|
21 |
|
22 |
function exploit_admin_page() {
|
23 |
+
global $suspicious_files, $wpdb, $wp_db_version;
|
24 |
if( !current_user_can( 'manage_options' ) )
|
25 |
wp_die( 'Not allowed here!' );
|
26 |
?><div class="wrap">
|
70 |
}
|
71 |
|
72 |
function search_install( $directory, $text ) {
|
73 |
+
global $suspicious_files, $modified_core_files;
|
74 |
set_time_limit( 60 );
|
75 |
+
include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
|
76 |
|
77 |
if(is_dir($directory)) {
|
78 |
$directory = trailingslashit( $directory );
|
118 |
}
|
119 |
|
120 |
function file_search( $suspect_text = '' ) {
|
121 |
+
global $suspicious_files, $wpdb, $wp_db_version, $modified_core_files;
|
122 |
|
123 |
+
if ( (int) @ini_get('memory_limit') < 128 )
|
124 |
+
@ini_set( 'memory_limit', '128M' ); // increase the memory limit if possible, to avoid out of memory errors
|
125 |
$suspicious_files = array();
|
126 |
if( $suspect_text == '' )
|
127 |
$suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
|
readme.txt
CHANGED
@@ -2,7 +2,7 @@
|
|
2 |
Contributors: donncha
|
3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
4 |
Tested up to: 2.6.3
|
5 |
-
Stable tag: 0.
|
6 |
Requires at least: 2.6.3
|
7 |
|
8 |
Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
|
@@ -13,6 +13,8 @@ This plugin searches the files on your website, and the posts and comments table
|
|
13 |
It does not remove anything. That is left to the user to do.
|
14 |
|
15 |
MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
|
|
|
|
|
16 |
|
17 |
See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
|
18 |
|
2 |
Contributors: donncha
|
3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
4 |
Tested up to: 2.6.3
|
5 |
+
Stable tag: 0.3
|
6 |
Requires at least: 2.6.3
|
7 |
|
8 |
Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
|
13 |
It does not remove anything. That is left to the user to do.
|
14 |
|
15 |
MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
|
16 |
+
MD5 for version 0.2: 48dd892fb9c41899af14e9cf94ec7ea8
|
17 |
+
MD5 for version 0.3: 44cc8a46861f18698789357fa2fc7e60
|
18 |
|
19 |
See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
|
20 |
|