Version Description
Download this release
Release Info
| Developer | donncha |
| Plugin | |
| Version | 0.3 |
| Comparing to | |
| See all releases | |
Code changes from version 0.2 to 0.3
- exploit-scanner.php +7 -9
- readme.txt +3 -1
exploit-scanner.php
CHANGED
|
@@ -3,16 +3,13 @@
|
|
| 3 |
Plugin Name: WordPress Exploit Scanner
|
| 4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
| 5 |
Description: Scans your WordPress site for possible exploits
|
| 6 |
-
Version: 0.
|
| 7 |
Author: Donncha O Caoimh
|
| 8 |
Author URI: http://ocaoimh.ie/
|
| 9 |
*/
|
| 10 |
|
| 11 |
function exploit_init() {
|
| 12 |
-
global $md5_list;
|
| 13 |
add_action('admin_menu', 'exploit_config_page');
|
| 14 |
-
if( is_admin() )
|
| 15 |
-
include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
|
| 16 |
}
|
| 17 |
add_action('init', 'exploit_init');
|
| 18 |
|
|
@@ -23,7 +20,7 @@ function exploit_config_page() {
|
|
| 23 |
}
|
| 24 |
|
| 25 |
function exploit_admin_page() {
|
| 26 |
-
global $suspicious_files, $
|
| 27 |
if( !current_user_can( 'manage_options' ) )
|
| 28 |
wp_die( 'Not allowed here!' );
|
| 29 |
?><div class="wrap">
|
|
@@ -73,8 +70,9 @@ function exploit_admin_page() {
|
|
| 73 |
}
|
| 74 |
|
| 75 |
function search_install( $directory, $text ) {
|
| 76 |
-
global $suspicious_files, $
|
| 77 |
set_time_limit( 60 );
|
|
|
|
| 78 |
|
| 79 |
if(is_dir($directory)) {
|
| 80 |
$directory = trailingslashit( $directory );
|
|
@@ -120,10 +118,10 @@ function hilight_text( $contents, $text ) {
|
|
| 120 |
}
|
| 121 |
|
| 122 |
function file_search( $suspect_text = '' ) {
|
| 123 |
-
global $suspicious_files, $
|
| 124 |
|
| 125 |
-
if ( (int) @ini_get('memory_limit') <
|
| 126 |
-
@ini_set( 'memory_limit', '
|
| 127 |
$suspicious_files = array();
|
| 128 |
if( $suspect_text == '' )
|
| 129 |
$suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
|
| 3 |
Plugin Name: WordPress Exploit Scanner
|
| 4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
| 5 |
Description: Scans your WordPress site for possible exploits
|
| 6 |
+
Version: 0.3
|
| 7 |
Author: Donncha O Caoimh
|
| 8 |
Author URI: http://ocaoimh.ie/
|
| 9 |
*/
|
| 10 |
|
| 11 |
function exploit_init() {
|
|
|
|
| 12 |
add_action('admin_menu', 'exploit_config_page');
|
|
|
|
|
|
|
| 13 |
}
|
| 14 |
add_action('init', 'exploit_init');
|
| 15 |
|
| 20 |
}
|
| 21 |
|
| 22 |
function exploit_admin_page() {
|
| 23 |
+
global $suspicious_files, $wpdb, $wp_db_version;
|
| 24 |
if( !current_user_can( 'manage_options' ) )
|
| 25 |
wp_die( 'Not allowed here!' );
|
| 26 |
?><div class="wrap">
|
| 70 |
}
|
| 71 |
|
| 72 |
function search_install( $directory, $text ) {
|
| 73 |
+
global $suspicious_files, $modified_core_files;
|
| 74 |
set_time_limit( 60 );
|
| 75 |
+
include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
|
| 76 |
|
| 77 |
if(is_dir($directory)) {
|
| 78 |
$directory = trailingslashit( $directory );
|
| 118 |
}
|
| 119 |
|
| 120 |
function file_search( $suspect_text = '' ) {
|
| 121 |
+
global $suspicious_files, $wpdb, $wp_db_version, $modified_core_files;
|
| 122 |
|
| 123 |
+
if ( (int) @ini_get('memory_limit') < 128 )
|
| 124 |
+
@ini_set( 'memory_limit', '128M' ); // increase the memory limit if possible, to avoid out of memory errors
|
| 125 |
$suspicious_files = array();
|
| 126 |
if( $suspect_text == '' )
|
| 127 |
$suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
|
readme.txt
CHANGED
|
@@ -2,7 +2,7 @@
|
|
| 2 |
Contributors: donncha
|
| 3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
| 4 |
Tested up to: 2.6.3
|
| 5 |
-
Stable tag: 0.
|
| 6 |
Requires at least: 2.6.3
|
| 7 |
|
| 8 |
Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
|
|
@@ -13,6 +13,8 @@ This plugin searches the files on your website, and the posts and comments table
|
|
| 13 |
It does not remove anything. That is left to the user to do.
|
| 14 |
|
| 15 |
MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
|
|
|
|
|
|
|
| 16 |
|
| 17 |
See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
|
| 18 |
|
| 2 |
Contributors: donncha
|
| 3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
| 4 |
Tested up to: 2.6.3
|
| 5 |
+
Stable tag: 0.3
|
| 6 |
Requires at least: 2.6.3
|
| 7 |
|
| 8 |
Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
|
| 13 |
It does not remove anything. That is left to the user to do.
|
| 14 |
|
| 15 |
MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
|
| 16 |
+
MD5 for version 0.2: 48dd892fb9c41899af14e9cf94ec7ea8
|
| 17 |
+
MD5 for version 0.3: 44cc8a46861f18698789357fa2fc7e60
|
| 18 |
|
| 19 |
See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
|
| 20 |
|
