Version Description
- Better Handling of error message from Server on signup
- Fixed firewall caching issue
- Minor bug fixes
Download this release
Release Info
Developer | ritesh.soni36 |
Plugin | MalCare WordPress Security Plugin – Malware Scanner, Cleaner, Security Firewall |
Version | 4.58 |
Comparing to | |
See all releases |
Code changes from version 4.57 to 4.58
- callback/wings/fs.php +1 -1
- callback/wings/info.php +5 -0
- callback/wings/watch.php +1 -1
- info.php +2 -2
- malcare.php +2 -2
- protect/fw/config.php +2 -0
- protect/fw/fw.php +8 -0
- readme.txt +6 -1
- wp_admin.php +1 -1
callback/wings/fs.php
CHANGED
@@ -168,7 +168,7 @@ class BVFSCallback extends BVCallbackBase {
|
|
168 |
if (is_dir($absfile) && !is_link($absfile)) {
|
169 |
$fdata['is_dir'] = true;
|
170 |
} else {
|
171 |
-
if (!is_readable($
|
172 |
$fdata['error'] = 'file not readable';
|
173 |
} else {
|
174 |
if ($withContent === true) {
|
168 |
if (is_dir($absfile) && !is_link($absfile)) {
|
169 |
$fdata['is_dir'] = true;
|
170 |
} else {
|
171 |
+
if (!is_readable($absfile)) {
|
172 |
$fdata['error'] = 'file not readable';
|
173 |
} else {
|
174 |
if ($withContent === true) {
|
callback/wings/info.php
CHANGED
@@ -247,6 +247,11 @@ class BVInfoCallback extends BVCallbackBase {
|
|
247 |
if (array_key_exists('IS_PRESSABLE', get_defined_constants())) {
|
248 |
$host_info['IS_PRESSABLE'] = true;
|
249 |
}
|
|
|
|
|
|
|
|
|
|
|
250 |
return array('host_info' => $host_info);
|
251 |
}
|
252 |
|
247 |
if (array_key_exists('IS_PRESSABLE', get_defined_constants())) {
|
248 |
$host_info['IS_PRESSABLE'] = true;
|
249 |
}
|
250 |
+
|
251 |
+
if (array_key_exists('GRIDPANE', get_defined_constants())) {
|
252 |
+
$host_info['IS_GRIDPANE'] = true;
|
253 |
+
}
|
254 |
+
|
255 |
return array('host_info' => $host_info);
|
256 |
}
|
257 |
|
callback/wings/watch.php
CHANGED
@@ -166,4 +166,4 @@ class BVWatchCallback extends BVCallbackBase {
|
|
166 |
return $resp;
|
167 |
}
|
168 |
}
|
169 |
-
endif;
|
166 |
return $resp;
|
167 |
}
|
168 |
}
|
169 |
+
endif;
|
info.php
CHANGED
@@ -10,7 +10,7 @@ if (!class_exists('MCInfo')) :
|
|
10 |
public $badgeinfo = 'mcbadge';
|
11 |
public $ip_header_option = 'mcipheader';
|
12 |
public $brand_option = 'mcbrand';
|
13 |
-
public $version = '4.
|
14 |
public $webpage = 'https://www.malcare.com';
|
15 |
public $appurl = 'https://app.malcare.com';
|
16 |
public $slug = 'malcare-security/malcare.php';
|
@@ -144,4 +144,4 @@ if ($bvinfo->canSetCWBranding()) {
|
|
144 |
);
|
145 |
}
|
146 |
}
|
147 |
-
endif;
|
10 |
public $badgeinfo = 'mcbadge';
|
11 |
public $ip_header_option = 'mcipheader';
|
12 |
public $brand_option = 'mcbrand';
|
13 |
+
public $version = '4.58';
|
14 |
public $webpage = 'https://www.malcare.com';
|
15 |
public $appurl = 'https://app.malcare.com';
|
16 |
public $slug = 'malcare-security/malcare.php';
|
144 |
);
|
145 |
}
|
146 |
}
|
147 |
+
endif;
|
malcare.php
CHANGED
@@ -5,7 +5,7 @@ Plugin URI: https://www.malcare.com
|
|
5 |
Description: MalCare Security - Free Malware Scanner, Protection & Security for WordPress
|
6 |
Author: MalCare Security
|
7 |
Author URI: https://www.malcare.com
|
8 |
-
Version: 4.
|
9 |
Network: True
|
10 |
*/
|
11 |
|
@@ -157,4 +157,4 @@ if ((array_key_exists('bvplugname', $_REQUEST)) && ($_REQUEST['bvplugname'] == "
|
|
157 |
|
158 |
}
|
159 |
##WPAUTOUPDATEBLOCKMODULE##
|
160 |
-
}
|
5 |
Description: MalCare Security - Free Malware Scanner, Protection & Security for WordPress
|
6 |
Author: MalCare Security
|
7 |
Author URI: https://www.malcare.com
|
8 |
+
Version: 4.58
|
9 |
Network: True
|
10 |
*/
|
11 |
|
157 |
|
158 |
}
|
159 |
##WPAUTOUPDATEBLOCKMODULE##
|
160 |
+
}
|
protect/fw/config.php
CHANGED
@@ -37,6 +37,8 @@ class BVFWConfig {
|
|
37 |
$this->cookieKey = array_key_exists('cookiekey', $confHash) ? $confHash['cookiekey'] : "";
|
38 |
$this->cookiePath = array_key_exists('cookiepath', $confHash) ? $confHash['cookiepath'] : "";
|
39 |
$this->cookieDomain = array_key_exists('cookiedomain', $confHash) ? $confHash['cookiedomain'] : "";
|
|
|
|
|
40 |
$this->rulesMode = array_key_exists('rulesmode', $confHash) ? intval($confHash['rulesmode']) : BVFWConfig::DISABLED;
|
41 |
}
|
42 |
|
37 |
$this->cookieKey = array_key_exists('cookiekey', $confHash) ? $confHash['cookiekey'] : "";
|
38 |
$this->cookiePath = array_key_exists('cookiepath', $confHash) ? $confHash['cookiepath'] : "";
|
39 |
$this->cookieDomain = array_key_exists('cookiedomain', $confHash) ? $confHash['cookiedomain'] : "";
|
40 |
+
$this->canSetCachePreventionCookie = array_key_exists('cansetcachepreventioncookie', $confHash) ?
|
41 |
+
$confHash['cansetcachepreventioncookie'] : false;
|
42 |
$this->rulesMode = array_key_exists('rulesmode', $confHash) ? intval($confHash['rulesmode']) : BVFWConfig::DISABLED;
|
43 |
}
|
44 |
|
protect/fw/fw.php
CHANGED
@@ -51,6 +51,7 @@ class BVFW {
|
|
51 |
|
52 |
const BYPASS_COOKIE = "bvfw-bypass-cookie";
|
53 |
const IP_COOKIE = "bvfw-ip-cookie";
|
|
|
54 |
|
55 |
public function __construct($logger, $confHash, $ip, $bvinfo, $ipstore, $ruleSet) {
|
56 |
$this->config = new BVFWConfig($confHash);
|
@@ -178,6 +179,13 @@ class BVFW {
|
|
178 |
$this->request->setCategory($category);
|
179 |
$this->request->setStatus(BVWPRequest::BLOCKED);
|
180 |
$this->request->setRespCode(403);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
181 |
header("Cache-Control: no-cache, no-store, must-revalidate");
|
182 |
header("Pragma: no-cache");
|
183 |
header("Expires: 0");
|
51 |
|
52 |
const BYPASS_COOKIE = "bvfw-bypass-cookie";
|
53 |
const IP_COOKIE = "bvfw-ip-cookie";
|
54 |
+
const PREVENT_CACHE_COOKIE = "wp-bvfw-prevent-cache-cookie";
|
55 |
|
56 |
public function __construct($logger, $confHash, $ip, $bvinfo, $ipstore, $ruleSet) {
|
57 |
$this->config = new BVFWConfig($confHash);
|
179 |
$this->request->setCategory($category);
|
180 |
$this->request->setStatus(BVWPRequest::BLOCKED);
|
181 |
$this->request->setRespCode(403);
|
182 |
+
|
183 |
+
if ($this->config->canSetCachePreventionCookie &&
|
184 |
+
!$this->request->getCookies(BVFW::PREVENT_CACHE_COOKIE)) {
|
185 |
+
$value = "Prevent Caching Response.";
|
186 |
+
$this->setcookie(BVFW::PREVENT_CACHE_COOKIE, $value, time() + 43200);
|
187 |
+
}
|
188 |
+
|
189 |
header("Cache-Control: no-cache, no-store, must-revalidate");
|
190 |
header("Pragma: no-cache");
|
191 |
header("Expires: 0");
|
readme.txt
CHANGED
@@ -6,7 +6,7 @@ Donate link: https://www.malcare.com
|
|
6 |
Requires at least: 4.0
|
7 |
Tested up to: 5.7
|
8 |
Requires PHP: 5.4.0
|
9 |
-
Stable tag: 4.
|
10 |
License: GPLv2 or later
|
11 |
License URI: [http://www.gnu.org/licenses/gpl-2.0.html](http://www.gnu.org/licenses/gpl-2.0.html)
|
12 |
|
@@ -397,6 +397,11 @@ These are available on our website: [Terms of Service](https://www.malcare.com/t
|
|
397 |
8. MalCare’s Uptime Monitoring notifies if a website goes down so that you can handle the situation before starting to lose visitors.
|
398 |
|
399 |
== CHANGELOG ==
|
|
|
|
|
|
|
|
|
|
|
400 |
= 4.57 =
|
401 |
* Fixed services data fetch bug
|
402 |
|
6 |
Requires at least: 4.0
|
7 |
Tested up to: 5.7
|
8 |
Requires PHP: 5.4.0
|
9 |
+
Stable tag: 4.58
|
10 |
License: GPLv2 or later
|
11 |
License URI: [http://www.gnu.org/licenses/gpl-2.0.html](http://www.gnu.org/licenses/gpl-2.0.html)
|
12 |
|
397 |
8. MalCare’s Uptime Monitoring notifies if a website goes down so that you can handle the situation before starting to lose visitors.
|
398 |
|
399 |
== CHANGELOG ==
|
400 |
+
= 4.58 =
|
401 |
+
* Better Handling of error message from Server on signup
|
402 |
+
* Fixed firewall caching issue
|
403 |
+
* Minor bug fixes
|
404 |
+
|
405 |
= 4.57 =
|
406 |
* Fixed services data fetch bug
|
407 |
|
wp_admin.php
CHANGED
@@ -102,7 +102,7 @@ class MCWPAdmin {
|
|
102 |
}
|
103 |
else if (($error == "custom") && isset($_REQUEST['bvnonce']) && wp_verify_nonce($_REQUEST['bvnonce'], "bvnonce")
|
104 |
&& isset($_REQUEST['message'])) {
|
105 |
-
echo $open_tag.nl2br(base64_decode($_REQUEST['message'])).$close_tag;
|
106 |
}
|
107 |
}
|
108 |
}
|
102 |
}
|
103 |
else if (($error == "custom") && isset($_REQUEST['bvnonce']) && wp_verify_nonce($_REQUEST['bvnonce'], "bvnonce")
|
104 |
&& isset($_REQUEST['message'])) {
|
105 |
+
echo $open_tag.nl2br(esc_html(base64_decode($_REQUEST['message']))).$close_tag;
|
106 |
}
|
107 |
}
|
108 |
}
|