Version Description
Download this release
Release Info
| Developer | tott |
| Plugin | |
| Version | 0.9 |
| Comparing to | |
| See all releases | |
Code changes from version 0.8 to 0.9
- exploit-scanner.php +8 -2
- readme.txt +2 -1
exploit-scanner.php
CHANGED
|
@@ -3,7 +3,7 @@
|
|
| 3 |
Plugin Name: WordPress Exploit Scanner
|
| 4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
| 5 |
Description: Scans your WordPress site for possible exploits.
|
| 6 |
-
Version: 0.
|
| 7 |
Author: Donncha O Caoimh
|
| 8 |
Author URI: http://ocaoimh.ie/
|
| 9 |
*/
|
|
@@ -338,12 +338,16 @@ class Exploit_Scanner {
|
|
| 338 |
function prepare_patterns() {
|
| 339 |
if ( ! empty( $this->restricted_patterns ) ) {
|
| 340 |
foreach ( $this->restricted_patterns as $pattern => $data ) {
|
|
|
|
|
|
|
| 341 |
$this->_prepared_patterns[] = $pattern;
|
| 342 |
$this->_pattern_descriptions[ $pattern ] = $data;
|
| 343 |
}
|
| 344 |
}
|
| 345 |
if ( ! empty( $this->whitelist_patterns ) ) {
|
| 346 |
foreach ( $this->whitelist_patterns as $pattern => $data ) {
|
|
|
|
|
|
|
| 347 |
$this->_prepared_patterns[] = $pattern;
|
| 348 |
$this->_pattern_descriptions[ $pattern ] = $data;
|
| 349 |
}
|
|
@@ -351,6 +355,8 @@ class Exploit_Scanner {
|
|
| 351 |
|
| 352 |
if ( ! empty( $this->restricted_commands ) ) {
|
| 353 |
foreach ( $this->restricted_commands as $command => $data) {
|
|
|
|
|
|
|
| 354 |
$cmd_pattern = "/\s+($command)+\s?\(+[\$|\'|\"]+/msiU";
|
| 355 |
$this->_prepared_patterns[] = $cmd_pattern;
|
| 356 |
$this->_pattern_descriptions[ $cmd_pattern ] = $data;
|
|
@@ -1106,7 +1112,7 @@ function exploit_admin_page() {
|
|
| 1106 |
<input type="hidden" name="action" value="get_exploitscanner_results_all">
|
| 1107 |
<table>
|
| 1108 |
<tr><td>Scans to execute:</td><td>General Infos <input type='checkbox' name='scans[]' value='info' <?php if ( empty( $_POST ) || in_array( 'info', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/> File scan <input type='checkbox' name='scans[]' value='file_scan' <?php if ( empty( $_POST ) || in_array( 'file_scan', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/> Database scan <input type='checkbox' name='scans[]' value='db_scan' <?php if ( empty( $_POST ) || in_array( 'db_scan', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/></td></tr>
|
| 1109 |
-
<tr><td>Severities to show:</td><td> Blocker <input type='checkbox' name='show[]' value='blocker' <?php if ( empty( $_POST ) || in_array( 'blocker', $_POST['show'] ) ) echo 'checked="checked"'; ?>/> Severe <input type='checkbox' name='show[]' value='severe' <?php if ( empty( $_POST ) || in_array( 'severe', $_POST['show'] ) ) echo 'checked="checked"'; ?>/> Warning <input type='checkbox' name='show[]' value='warning' <?php if ( empty( $_POST )
|
| 1110 |
<tr><td>Skip check:</td><td> File permission scan <input type='checkbox' name='skip_checks[]' value='file_permission_scan' <?php if ( empty( $_POST ) || in_array( 'file_permission_scan', $_POST['skip_checks'] ) ) echo 'checked="checked"'; ?> /></td></tr>
|
| 1111 |
<tr><td>PHP Memory Limit:</td><td> <input type='text' size='3' name='memory_limit' value='<?php echo $_POST['memory_limit'] ? $_POST['memory_limit'] : 128; ?>'/>MB (Max memory used by PHP.)</td></tr>
|
| 1112 |
<tr><td>Upper File size Limit:</td><td> <input type='text' size='3' name='filesize_limit' value='<?php echo $_POST['filesize_limit'] ? $_POST['filesize_limit'] : 400; ?>' />KB (Skip files larger than this. Skipped files are listed at the end of scan.)</td></tr>
|
| 3 |
Plugin Name: WordPress Exploit Scanner
|
| 4 |
Plugin URI: http://ocaoimh.ie/exploit-scanner/
|
| 5 |
Description: Scans your WordPress site for possible exploits.
|
| 6 |
+
Version: 0.9
|
| 7 |
Author: Donncha O Caoimh
|
| 8 |
Author URI: http://ocaoimh.ie/
|
| 9 |
*/
|
| 338 |
function prepare_patterns() {
|
| 339 |
if ( ! empty( $this->restricted_patterns ) ) {
|
| 340 |
foreach ( $this->restricted_patterns as $pattern => $data ) {
|
| 341 |
+
if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
|
| 342 |
+
continue;
|
| 343 |
$this->_prepared_patterns[] = $pattern;
|
| 344 |
$this->_pattern_descriptions[ $pattern ] = $data;
|
| 345 |
}
|
| 346 |
}
|
| 347 |
if ( ! empty( $this->whitelist_patterns ) ) {
|
| 348 |
foreach ( $this->whitelist_patterns as $pattern => $data ) {
|
| 349 |
+
if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
|
| 350 |
+
continue;
|
| 351 |
$this->_prepared_patterns[] = $pattern;
|
| 352 |
$this->_pattern_descriptions[ $pattern ] = $data;
|
| 353 |
}
|
| 355 |
|
| 356 |
if ( ! empty( $this->restricted_commands ) ) {
|
| 357 |
foreach ( $this->restricted_commands as $command => $data) {
|
| 358 |
+
if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
|
| 359 |
+
continue;
|
| 360 |
$cmd_pattern = "/\s+($command)+\s?\(+[\$|\'|\"]+/msiU";
|
| 361 |
$this->_prepared_patterns[] = $cmd_pattern;
|
| 362 |
$this->_pattern_descriptions[ $cmd_pattern ] = $data;
|
| 1112 |
<input type="hidden" name="action" value="get_exploitscanner_results_all">
|
| 1113 |
<table>
|
| 1114 |
<tr><td>Scans to execute:</td><td>General Infos <input type='checkbox' name='scans[]' value='info' <?php if ( empty( $_POST ) || in_array( 'info', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/> File scan <input type='checkbox' name='scans[]' value='file_scan' <?php if ( empty( $_POST ) || in_array( 'file_scan', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/> Database scan <input type='checkbox' name='scans[]' value='db_scan' <?php if ( empty( $_POST ) || in_array( 'db_scan', $_POST['scans'] ) ) echo 'checked="checked"'; ?>/></td></tr>
|
| 1115 |
+
<tr><td>Severities to show:</td><td> Blocker <input type='checkbox' name='show[]' value='blocker' <?php if ( empty( $_POST ) || in_array( 'blocker', $_POST['show'] ) ) echo 'checked="checked"'; ?>/> Severe <input type='checkbox' name='show[]' value='severe' <?php if ( empty( $_POST ) || in_array( 'severe', $_POST['show'] ) ) echo 'checked="checked"'; ?>/> Warning <input type='checkbox' name='show[]' value='warning' <?php if ( !empty( $_POST ) && in_array( 'warning', $_POST['show'] ) ) echo 'checked="checked"'; ?>/> Note <input type='checkbox' name='show[]' value='note' <?php if ( !empty( $_POST ) && in_array( 'note', $_POST['show'] ) ) echo 'checked="checked"'; ?>/></td></tr>
|
| 1116 |
<tr><td>Skip check:</td><td> File permission scan <input type='checkbox' name='skip_checks[]' value='file_permission_scan' <?php if ( empty( $_POST ) || in_array( 'file_permission_scan', $_POST['skip_checks'] ) ) echo 'checked="checked"'; ?> /></td></tr>
|
| 1117 |
<tr><td>PHP Memory Limit:</td><td> <input type='text' size='3' name='memory_limit' value='<?php echo $_POST['memory_limit'] ? $_POST['memory_limit'] : 128; ?>'/>MB (Max memory used by PHP.)</td></tr>
|
| 1118 |
<tr><td>Upper File size Limit:</td><td> <input type='text' size='3' name='filesize_limit' value='<?php echo $_POST['filesize_limit'] ? $_POST['filesize_limit'] : 400; ?>' />KB (Skip files larger than this. Skipped files are listed at the end of scan.)</td></tr>
|
readme.txt
CHANGED
|
@@ -2,7 +2,7 @@
|
|
| 2 |
Contributors: donncha, duck_, ryan, azaozz, tott
|
| 3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
| 4 |
Tested up to: 2.8.6
|
| 5 |
-
Stable tag: 0.
|
| 6 |
Requires at least: 2.7.1
|
| 7 |
Donate link: http://ocaoimh.ie/wordpress-plugins/gifts-and-donations/
|
| 8 |
|
|
@@ -13,6 +13,7 @@ This plugin searches the files on your website, and the posts and comments table
|
|
| 13 |
|
| 14 |
It does not remove anything. That is left to the user to do.
|
| 15 |
|
|
|
|
| 16 |
* MD5 for version 0.8: d06d1f04d3652cafb862756ecc499884
|
| 17 |
* MD5 for version 0.7: 1d4b6797f10685bd271ebc1ec17b782c
|
| 18 |
* MD5 for version 0.6: a36d9eb168e51b62c61b1ab4afee8243
|
| 2 |
Contributors: donncha, duck_, ryan, azaozz, tott
|
| 3 |
Tags: hacking, spam, hack, crack, exploit, vulnerability
|
| 4 |
Tested up to: 2.8.6
|
| 5 |
+
Stable tag: 0.9
|
| 6 |
Requires at least: 2.7.1
|
| 7 |
Donate link: http://ocaoimh.ie/wordpress-plugins/gifts-and-donations/
|
| 8 |
|
| 13 |
|
| 14 |
It does not remove anything. That is left to the user to do.
|
| 15 |
|
| 16 |
+
* MD5 for version 0.9: c854cfad74d1a21111864d64600ff415
|
| 17 |
* MD5 for version 0.8: d06d1f04d3652cafb862756ecc499884
|
| 18 |
* MD5 for version 0.7: 1d4b6797f10685bd271ebc1ec17b782c
|
| 19 |
* MD5 for version 0.6: a36d9eb168e51b62c61b1ab4afee8243
|
