Willkommen bei WordPress. Dies ist dein erster Beitrag. Bearbeite oder lösche ihn und beginne mit dem Schreiben!
Hallo Welt!
von raredesign | Dez 3, 2019 | Allgemein | 0 Kommentare
Cokiee Shell
Current Path : /var/www/web284/html/wp-content/plugins/wordfence/lib/ |
Current File : //var/www/web284/html/wp-content/plugins/wordfence/lib/wfScanEngine.php |
<?php require_once('wordfenceClass.php'); require_once('wordfenceHash.php'); require_once('wfAPI.php'); require_once('wordfenceScanner.php'); require_once('wfIssues.php'); require_once('wfDB.php'); require_once('wfUtils.php'); class wfScanEngine { public $api = false; private $dictWords = array(); private $forkRequested = false; //Beginning of serialized properties on sleep private $hasher = false; private $jobList = array(); private $i = false; private $wp_version = false; private $apiKey = false; private $startTime = 0; public $maxExecTime = false; //If more than $maxExecTime has elapsed since last check, fork a new scan process and continue private $publicScanEnabled = false; private $fileContentsResults = false; /** * @var bool|wordfenceScanner */ private $scanner = false; private $scanQueue = array(); private $hoover = false; private $scanData = array(); private $statusIDX = array( 'core' => false, 'plugin' => false, 'theme' => false, 'unknown' => false ); private $userPasswdQueue = ""; private $passwdHasIssues = false; /** * @var array */ private $databaseResults; /** * @var wordfenceDBScanner */ private $dbScanner; public function __sleep(){ //Same order here as above for properties that are included in serialization return array('hasher', 'jobList', 'i', 'wp_version', 'apiKey', 'startTime', 'maxExecTime', 'publicScanEnabled', 'fileContentsResults', 'scanner', 'scanQueue', 'hoover', 'scanData', 'statusIDX', 'userPasswdQueue', 'passwdHasIssues', 'databaseResults', 'dbScanner'); } public function __construct(){ $this->startTime = time(); $this->maxExecTime = self::getMaxExecutionTime(); $this->i = new wfIssues(); $this->cycleStartTime = time(); $this->wp_version = wfUtils::getWPVersion(); $this->apiKey = wfConfig::get('apiKey'); $this->api = new wfAPI($this->apiKey, $this->wp_version); include('wfDict.php'); //$dictWords $this->dictWords = $dictWords; $this->jobList[] = 'publicSite'; $this->jobList[] = 'checkSpamvertized'; $this->jobList[] = 'checkSpamIP'; $this->jobList[] = 'heartbleed'; $this->jobList[] = 'knownFiles_init'; $this->jobList[] = 'knownFiles_main'; $this->jobList[] = 'knownFiles_finish'; foreach (array('knownFiles', 'fileContents', 'database', 'posts', 'comments', 'passwds', 'dns', 'diskSpace', 'oldVersions') as $scanType) { if (wfConfig::get('scansEnabled_' . $scanType)) { if (method_exists($this, 'scan_' . $scanType . '_init')) { foreach (array('init', 'main', 'finish') as $op) { $this->jobList[] = $scanType . '_' . $op; }; } else if (method_exists($this, 'scan_' . $scanType)) { $this->jobList[] = $scanType; } } } } public function deleteNewIssues(){ $this->i->deleteNew(); } public function __wakeup(){ $this->cycleStartTime = time(); $this->api = new wfAPI($this->apiKey, $this->wp_version); include('wfDict.php'); //$dictWords $this->dictWords = $dictWords; } public function go(){ try { self::checkForKill(); $this->doScan(); wfConfig::set('lastScanCompleted', 'ok'); self::checkForKill(); //updating this scan ID will trigger the scan page to load/reload the results. $this->i->setScanTimeNow(); //scan ID only incremented at end of scan to make UI load new results $this->emailNewIssues(); } catch(Exception $e){ wfConfig::set('lastScanCompleted', $e->getMessage()); throw $e; } } public function forkIfNeeded(){ self::checkForKill(); if(time() - $this->cycleStartTime > $this->maxExecTime){ wordfence::status(4, 'info', "Forking during hash scan to ensure continuity."); $this->fork(); } } public function fork(){ wordfence::status(4, 'info', "Entered fork()"); if(wfConfig::set_ser('wfsd_engine', $this, true)){ wordfence::status(4, 'info', "Calling startScan(true)"); self::startScan(true); } //Otherwise there was an error so don't start another scan. exit(0); } public function emailNewIssues(){ $this->i->emailNewIssues(); } private function doScan(){ while(sizeof($this->jobList) > 0){ self::checkForKill(); $jobName = $this->jobList[0]; $callback = array($this, 'scan_' . $jobName); if (is_callable($callback)) { call_user_func($callback); } array_shift($this->jobList); //only shift once we're done because we may pause halfway through a job and need to pick up where we left off self::checkForKill(); if($this->forkRequested){ $this->fork(); } else { $this->forkIfNeeded(); } } $summary = $this->i->getSummaryItems(); $this->status(1, 'info', '-------------------'); $this->status(1, 'info', "Scan Complete. Scanned " . $summary['totalFiles'] . " files, " . $summary['totalPlugins'] . " plugins, " . $summary['totalThemes'] . " themes, " . ($summary['totalPages'] + $summary['totalPosts']) . " pages, " . $summary['totalComments'] . " comments and " . $summary['totalRows'] . " records in " . (time() - $this->startTime) . " seconds."); if($this->i->totalIssues > 0){ $this->status(10, 'info', "SUM_FINAL:Scan complete. You have " . $this->i->totalIssues . " new issues to fix. See below."); } else { $this->status(10, 'info', "SUM_FINAL:Scan complete. Congratulations, no problems found."); } return; } public function getCurrentJob(){ return $this->jobList[0]; } private function scan_heartbleed(){ if(wfConfig::get('scansEnabled_heartbleed')){ $this->statusIDX['heartbleed'] = wordfence::statusStart("Scanning your site for the HeartBleed vulnerability"); $result = $this->api->call('scan_heartbleed', array(), array( 'siteURL' => site_url() )); $haveIssues = false; if($result['haveIssues'] && is_array($result['issues']) ){ foreach($result['issues'] as $issue){ $this->addIssue($issue['type'], $issue['level'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data']); $haveIssues = true; } } wordfence::statusEnd($this->statusIDX['heartbleed'], $haveIssues); } else { wordfence::statusDisabled("Skipping HeartBleed scan"); } } private function scan_publicSite(){ if(wfConfig::get('isPaid')){ if(wfConfig::get('scansEnabled_public')){ $this->publicScanEnabled = true; $this->statusIDX['public'] = wordfence::statusStart("Doing Remote Scan of public site for problems"); $result = $this->api->call('scan_public_site', array(), array( 'siteURL' => site_url() )); $haveIssues = false; if($result['haveIssues'] && is_array($result['issues']) ){ foreach($result['issues'] as $issue){ $this->addIssue($issue['type'], $issue['level'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data']); $haveIssues = true; } } wordfence::statusEnd($this->statusIDX['public'], $haveIssues); } else { wordfence::statusDisabled("Skipping remote scan of public site for problems"); } } else { wordfence::statusPaidOnly("Remote scan of public facing site only available to paid members"); sleep(2); //enough time to read the message before it scrolls off. } } private function scan_checkSpamIP(){ if(wfConfig::get('isPaid')){ if(wfConfig::get('checkSpamIP')){ $this->statusIDX['checkSpamIP'] = wordfence::statusStart("Checking if your site IP is generating spam"); $result = $this->api->call('check_spam_ip', array(), array( 'siteURL' => site_url() )); $haveIssues = false; if(!empty($result['haveIssues']) && is_array($result['issues']) ){ foreach($result['issues'] as $issue){ $this->addIssue($issue['type'], $issue['level'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data']); $haveIssues = true; } } wordfence::statusEnd($this->statusIDX['checkSpamIP'], $haveIssues); } else { wordfence::statusDisabled("Skipping check if your IP is generating spam"); } } else { wordfence::statusPaidOnly("Checking if your IP is generating spam is for paid members only"); sleep(2); } } private function scan_checkSpamvertized(){ if(wfConfig::get('isPaid')){ if(wfConfig::get('spamvertizeCheck')){ $this->statusIDX['spamvertizeCheck'] = wordfence::statusStart("Checking if your site is being Spamvertised"); $result = $this->api->call('spamvertize_check', array(), array( 'siteURL' => site_url() )); $haveIssues = false; if($result['haveIssues'] && is_array($result['issues']) ){ foreach($result['issues'] as $issue){ $this->addIssue($issue['type'], $issue['level'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data']); $haveIssues = true; } } wordfence::statusEnd($this->statusIDX['spamvertizeCheck'], $haveIssues); } else { wordfence::statusDisabled("Skipping check if your site is being spamvertized"); } } else { wordfence::statusPaidOnly("Check if your site is being Spamvertized is for paid members only"); sleep(2); } } private function scan_knownFiles_init(){ $this->status(1, 'info', "Contacting Wordfence to initiate scan"); $this->api->call('log_scan', array(), array()); $baseWPStuff = array( '.htaccess', 'index.php', 'license.txt', 'readme.html', 'wp-activate.php', 'wp-admin', 'wp-app.php', 'wp-blog-header.php', 'wp-comments-post.php', 'wp-config-sample.php', 'wp-content', 'wp-cron.php', 'wp-includes', 'wp-links-opml.php', 'wp-load.php', 'wp-login.php', 'wp-mail.php', 'wp-pass.php', 'wp-register.php', 'wp-settings.php', 'wp-signup.php', 'wp-trackback.php', 'xmlrpc.php'); $baseContents = scandir(ABSPATH); if(! is_array($baseContents)){ throw new Exception("Wordfence could not read the contents of your base WordPress directory. This usually indicates your permissions are so strict that your web server can't read your WordPress directory."); } $scanOutside = wfConfig::get('other_scanOutside'); if($scanOutside){ wordfence::status(2, 'info', "Including files that are outside the WordPress installation in the scan."); } $includeInKnownFilesScan = array(); foreach($baseContents as $file){ //Only include base files less than a meg that are files. if($file == '.' || $file == '..'){ continue; } $fullFile = rtrim(ABSPATH, '/') . '/' . $file; if($scanOutside){ $includeInKnownFilesScan[] = $file; } else if(in_array($file, $baseWPStuff) || (@is_file($fullFile) && @is_readable($fullFile) && (! wfUtils::fileTooBig($fullFile)) ) ){ $includeInKnownFilesScan[] = $file; } } if(! function_exists( 'get_plugins')){ require_once ABSPATH . '/wp-admin/includes/plugin.php'; } $this->status(2, 'info', "Getting plugin list from WordPress"); $pluginData = get_plugins(); $knownFilesPlugins = array(); foreach($pluginData as $key => $data){ if(preg_match('/^([^\/]+)\//', $key, $matches)){ $pluginDir = $matches[1]; $pluginFullDir = "wp-content/plugins/" . $pluginDir; $knownFilesPlugins[$key] = array( 'Name' => $data['Name'], 'Version' => $data['Version'], 'ShortDir' => $pluginDir, 'FullDir' => $pluginFullDir ); } } $this->status(2, 'info', "Found " . sizeof($knownFilesPlugins) . " plugins"); $this->i->updateSummaryItem('totalPlugins', sizeof($knownFilesPlugins)); if (!function_exists('wp_get_themes')) { require_once ABSPATH . '/wp-includes/theme.php'; } $this->status(2, 'info', "Getting theme list from WordPress"); $themes = wp_get_themes(); foreach ($themes as $themeName => $themeVal) { if (preg_match('/\/([^\/]+)$/', $themeVal['Stylesheet Dir'], $matches)) { $shortDir = $matches[1]; //e.g. evo4cms $fullDir = substr($themeVal['Stylesheet Dir'], strlen(ABSPATH)); //e.g. wp-content/themes/evo4cms $knownFilesThemes[$themeName] = array( 'Name' => $themeVal['Name'], 'Version' => $themeVal['Version'], 'ShortDir' => $shortDir, 'FullDir' => $fullDir ); } } $this->status(2, 'info', "Found " . sizeof($knownFilesThemes) . " themes"); $this->i->updateSummaryItem('totalThemes', sizeof($knownFilesThemes)); $this->hasher = new wordfenceHash(strlen(ABSPATH), ABSPATH, $includeInKnownFilesScan, $knownFilesThemes, $knownFilesPlugins, $this); } private function scan_knownFiles_main(){ $this->hasher->run($this); //Include this so we can call addIssue and ->api-> $this->i->updateSummaryItem('totalData', wfUtils::formatBytes($this->hasher->totalData)); $this->i->updateSummaryItem('totalFiles', $this->hasher->totalFiles); $this->i->updateSummaryItem('totalDirs', $this->hasher->totalDirs); $this->i->updateSummaryItem('linesOfPHP', $this->hasher->linesOfPHP); $this->i->updateSummaryItem('linesOfJCH', $this->hasher->linesOfJCH); $this->hasher = false; } private function scan_knownFiles_finish(){ } private function scan_fileContents_init(){ $this->statusIDX['infect'] = wordfence::statusStart('Scanning file contents for infections and vulnerabilities'); $this->statusIDX['GSB'] = wordfence::statusStart('Scanning files for URLs in Google\'s Safe Browsing List'); $this->scanner = new wordfenceScanner($this->apiKey, $this->wp_version, ABSPATH); $this->status(2, 'info', "Starting scan of file contents"); } private function scan_fileContents_main(){ $this->fileContentsResults = $this->scanner->scan($this); } private function scan_fileContents_finish(){ $this->status(2, 'info', "Done file contents scan"); if($this->scanner->errorMsg){ throw new Exception($this->scanner->errorMsg); } $this->scanner = null; $haveIssues = false; $haveIssuesGSB = false; foreach($this->fileContentsResults as $issue){ $this->status(2, 'info', "Adding issue: " . $issue['shortMsg']); if($this->addIssue($issue['type'], $issue['severity'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data'])){ if(empty($issue['data']['gsb']) === false){ $haveIssuesGSB = true; } else { $haveIssues = true; } } } $this->fileContentsResults = null; wordfence::statusEnd($this->statusIDX['infect'], $haveIssues); wordfence::statusEnd($this->statusIDX['GSB'], $haveIssuesGSB); } private function scan_database_init() { $this->statusIDX['db_infect'] = wordfence::statusStart('Scanning database for infections and vulnerabilities'); $this->dbScanner = new wordfenceDBScanner($this->apiKey, $this->wp_version, ABSPATH); $this->status(2, 'info', "Starting scan of database"); } private function scan_database_main() { if (!$this->dbScanner) { $this->dbScanner = new wordfenceDBScanner($this->apiKey, $this->wp_version, ABSPATH); } $this->databaseResults = $this->dbScanner->scan($this); } private function scan_database_finish() { $this->status(2, 'info', "Done database scan"); if ($this->dbScanner->errorMsg) { throw new Exception($this->dbScanner->errorMsg); } $this->dbScanner = null; $haveIssues = false; foreach ($this->databaseResults as $issue) { $this->status(2, 'info', "Adding issue: " . $issue['shortMsg']); $issue_success = $this->addIssue($issue['type'], $issue['severity'], $issue['ignoreP'], $issue['ignoreC'], $issue['shortMsg'], $issue['longMsg'], $issue['data']); if ($issue_success) { $haveIssues = true; } } $this->databaseResults = null; $blogsToScan = self::getBlogsToScan('options'); $wfdb = new wfDB(); foreach ($blogsToScan as $blog) { $charset = $wfdb->querySingle("SELECT option_value FROM " . $blog['table'] . " WHERE option_name='blog_charset'"); if (strtolower($charset) == 'utf-7') { $this->addIssue('database', 1, $blog['blog_id'] . 'blog_charset', $blog['blog_id'] . 'blog_charset', "An option was found in your site that indicates it may have been hacked.", "The 'blog_charset' option in your database is set to '" . $charset . "' which indicates your site may have been hacked. If hackers can gain access to your database via phpMyAdmin for example, they will change this value in order to inject malicious code into other parts of your site or allow XSS attacks. The 'badi' hack does this.", array( 'isMultisite' => $blog['isMultisite'], 'domain' => $blog['domain'], 'path' => $blog['path'], 'blog_id' => $blog['blog_id'] )); $haveIssues = true; } } wordfence::statusEnd($this->statusIDX['db_infect'], $haveIssues); } private function scan_posts_init(){ $this->statusIDX['posts'] = wordfence::statusStart('Scanning posts for URL\'s in Google\'s Safe Browsing List'); $blogsToScan = self::getBlogsToScan('posts'); $wfdb = new wfDB(); $this->hoover = new wordfenceURLHoover($this->apiKey, $this->wp_version); foreach($blogsToScan as $blog){ $q1 = $wfdb->querySelect("select ID from " . $blog['table'] . " where post_type IN ('page', 'post') and post_status = 'publish'"); foreach($q1 as $idRow){ $this->scanQueue[] = array($blog, $idRow['ID']); } } } private function scan_posts_main(){ $wfdb = new wfDB(); while($elem = array_shift($this->scanQueue)){ $blog = $elem[0]; $postID = $elem[1]; $row = $wfdb->querySingleRec("select ID, post_title, post_type, post_date, post_content from " . $blog['table'] . " where ID=%d", $postID); $this->hoover->hoover($blog['blog_id'] . '-' . $row['ID'], $row['post_title'] . ' ' . $row['post_content']); if(preg_match('/(?:<[\s\n\r\t]*script[\r\s\n\t]+.*>|<[\s\n\r\t]*meta.*refresh)/i', $row['post_title'])){ $postID = $row['ID']; $this->addIssue('postBadTitle', 1, $row['ID'], md5($row['post_title']), "Post title contains suspicious code", "This post contains code that is suspicious. Please check the title of the post and confirm that the code in the title is not malicious.", array( 'postID' => $postID, 'postTitle' => $row['post_title'], 'permalink' => get_permalink($postID), 'editPostLink' => get_edit_post_link($postID), 'type' => $row['post_type'], 'postDate' => $row['post_date'], 'isMultisite' => $blog['isMultisite'], 'domain' => $blog['domain'], 'path' => $blog['path'], 'blog_id' => $blog['blog_id'] )); } $this->scanData[$blog['blog_id'] . '-' . $row['ID']] = array( 'contentMD5' => md5($row['post_content']), 'title' => $row['post_title'], 'type' => $row['post_type'], 'postDate' => $row['post_date'], 'isMultisite' => $blog['isMultisite'], 'domain' => $blog['domain'], 'path' => $blog['path'], 'blog_id' => $blog['blog_id'] ); $this->forkIfNeeded(); } } private function scan_posts_finish(){ $this->status(2, 'info', "Examining URLs found in posts we scanned for dangerous websites"); $hooverResults = $this->hoover->getBaddies(); $this->status(2, 'info', "Done examining URLs"); if($this->hoover->errorMsg){ wordfence::statusEndErr(); throw new Exception($this->hoover->errorMsg); } $this->hoover->cleanup(); $haveIssues = false; foreach($hooverResults as $idString => $hresults){ $arr = explode('-', $idString); $blogID = $arr[0]; $postID = $arr[1]; $uctype = ucfirst($this->scanData[$idString]['type']); $type = $this->scanData[$idString]['type']; foreach($hresults as $result){ if($result['badList'] == 'goog-malware-shavar'){ $shortMsg = "$uctype contains a suspected malware URL: " . $this->scanData[$idString]['title']; $longMsg = "This $type contains a suspected malware URL listed on Google's list of malware sites. The URL is: " . $result['URL'] . " - More info available at <a href=\"http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=" . urlencode($result['URL']) . "&client=googlechrome&hl=en-US\" target=\"_blank\">Google Safe Browsing diagnostic page</a>."; } else if($result['badList'] == 'googpub-phish-shavar'){ $shortMsg = "$uctype contains a suspected phishing site URL: " . $this->scanData[$idString]['title']; $longMsg = "This $type contains a URL that is a suspected phishing site that is currently listed on Google's list of known phishing sites. The URL is: " . $result['URL']; } else { //A list type that may be new and the plugin has not been upgraded yet. continue; } $this->status(2, 'info', "Adding issue: $shortMsg"); if(is_multisite()){ switch_to_blog($blogID); } $ignoreP = $idString; $ignoreC = $idString . $this->scanData[$idString]['contentMD5']; if($this->addIssue('postBadURL', 1, $ignoreP, $ignoreC, $shortMsg, $longMsg, array( 'postID' => $postID, 'badURL' => $result['URL'], 'postTitle' => $this->scanData[$idString]['title'], 'type' => $this->scanData[$idString]['type'], 'uctype' => $uctype, 'permalink' => get_permalink($postID), 'editPostLink' => get_edit_post_link($postID), 'postDate' => $this->scanData[$idString]['postDate'], 'isMultisite' => $this->scanData[$idString]['isMultisite'], 'domain' => $this->scanData[$idString]['domain'], 'path' => $this->scanData[$idString]['path'], 'blog_id' => $blogID ))){ $haveIssues = true; } if(is_multisite()){ restore_current_blog(); } } } $this->scanData = array(); wordfence::statusEnd($this->statusIDX['posts'], $haveIssues); } private function scan_comments_init(){ $this->statusIDX['comments'] = wordfence::statusStart('Scanning comments for URL\'s in Google\'s Safe Browsing List'); $this->scanData = array(); $this->scanQueue = array(); $this->hoover = new wordfenceURLHoover($this->apiKey, $this->wp_version); $blogsToScan = self::getBlogsToScan('comments'); $wfdb = new wfDB(); foreach($blogsToScan as $blog){ $q1 = $wfdb->querySelect("select comment_ID from " . $blog['table'] . " where comment_approved=1"); foreach($q1 as $idRow){ $this->scanQueue[] = array($blog, $idRow['comment_ID']); } } } private function scan_comments_main(){ $wfdb = new wfDB(); while($elem = array_shift($this->scanQueue)){ $queueSize = sizeof($this->scanQueue); if($queueSize > 0 && $queueSize % 1000 == 0){ wordfence::status(2, 'info', "Scanning comments with $queueSize left to scan."); } $blog = $elem[0]; $commentID = $elem[1]; $row = $wfdb->querySingleRec("select comment_ID, comment_date, comment_type, comment_author, comment_author_url, comment_content from " . $blog['table'] . " where comment_ID=%d", $commentID); $this->hoover->hoover($blog['blog_id'] . '-' . $row['comment_ID'], $row['comment_author_url'] . ' ' . $row['comment_author'] . ' ' . $row['comment_content']); $this->scanData[$blog['blog_id'] . '-' . $row['comment_ID']] = array( 'contentMD5' => md5($row['comment_content'] . $row['comment_author'] . $row['comment_author_url']), 'author' => $row['comment_author'], 'type' => ($row['comment_type'] ? $row['comment_type'] : 'comment'), 'date' => $row['comment_date'], 'isMultisite' => $blog['isMultisite'], 'domain' => $blog['domain'], 'path' => $blog['path'], 'blog_id' => $blog['blog_id'] ); $this->forkIfNeeded(); } } private function scan_comments_finish(){ $hooverResults = $this->hoover->getBaddies(); if($this->hoover->errorMsg){ wordfence::statusEndErr(); throw new Exception($this->hoover->errorMsg); } $this->hoover->cleanup(); $haveIssues = false; foreach($hooverResults as $idString => $hresults){ $arr = explode('-', $idString); $blogID = $arr[0]; $commentID = $arr[1]; $uctype = ucfirst($this->scanData[$idString]['type']); $type = $this->scanData[$idString]['type']; foreach($hresults as $result){ if($result['badList'] == 'goog-malware-shavar'){ $shortMsg = "$uctype with author " . $this->scanData[$idString]['author'] . " contains a suspected malware URL."; $longMsg = "This $type contains a suspected malware URL listed on Google's list of malware sites. The URL is: " . $result['URL'] . " - More info available at <a href=\"http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=" . urlencode($result['URL']) . "&client=googlechrome&hl=en-US\" target=\"_blank\">Google Safe Browsing diagnostic page</a>."; } else if($result['badList'] == 'googpub-phish-shavar'){ $shortMsg = "$uctype contains a suspected phishing site URL."; $longMsg = "This $type contains a URL that is a suspected phishing site that is currently listed on Google's list of known phishing sites. The URL is: " . $result['URL']; } else { //A list type that may be new and the plugin has not been upgraded yet. continue; } if(is_multisite()){ switch_to_blog($blogID); } $ignoreP = $idString; $ignoreC = $idString . '-' . $this->scanData[$idString]['contentMD5']; if($this->addIssue('commentBadURL', 1, $ignoreP, $ignoreC, $shortMsg, $longMsg, array( 'commentID' => $commentID, 'badURL' => $result['URL'], 'author' => $this->scanData[$idString]['author'], 'type' => $type, 'uctype' => $uctype, 'editCommentLink' => get_edit_comment_link($commentID), 'commentDate' => $this->scanData[$idString]['date'], 'isMultisite' => $this->scanData[$idString]['isMultisite'], 'domain' => $this->scanData[$idString]['domain'], 'path' => $this->scanData[$idString]['path'], 'blog_id' => $blogID ))){ $haveIssues = true; } if(is_multisite()){ restore_current_blog(); } } } wordfence::statusEnd($this->statusIDX['comments'], $haveIssues); } public function isBadComment($author, $email, $url, $IP, $content){ $content = $author . ' ' . $email . ' ' . $url . ' ' . $IP . ' ' . $content; $cDesc = ''; if($author){ $cDesc = "Author: $author "; } if($email){ $cDesc .= "Email: $email "; } $cDesc .= "Source IP: $IP "; $this->status(2, 'info', "Scanning comment with $cDesc"); $h = new wordfenceURLHoover($this->apiKey, $this->wp_version); $h->hoover(1, $content); $hooverResults = $h->getBaddies(); if($h->errorMsg){ return false; } $h->cleanup(); if(sizeof($hooverResults) > 0 && isset($hooverResults[1])){ $hresults = $hooverResults[1]; foreach($hresults as $result){ if($result['badList'] == 'goog-malware-shavar'){ $this->status(2, 'info', "Marking comment as spam for containing a malware URL. Comment has $cDesc"); return true; } else if($result['badList'] == 'googpub-phish-shavar'){ $this->status(2, 'info', "Marking comment as spam for containing a phishing URL. Comment has $cDesc"); return true; } else { //A list type that may be new and the plugin has not been upgraded yet. continue; } } } $this->status(2, 'info', "Scanned comment with $cDesc"); return false; } public static function getBlogsToScan($table){ $wfdb = new wfDB(); global $wpdb; $prefix = $wpdb->base_prefix; $blogsToScan = array(); if(is_multisite()){ $q1 = $wfdb->querySelect("select blog_id, domain, path from $prefix"."blogs where deleted=0 order by blog_id asc"); foreach($q1 as $row){ $row['isMultisite'] = true; if($row['blog_id'] == 1){ $row['table'] = $prefix . $table; } else { $row['table'] = $prefix . $row['blog_id'] . '_' . $table; } $blogsToScan[] = $row; } } else { $blogsToScan[] = array( 'isMultisite' => false, 'table' => $prefix . $table, 'blog_id' => '1', 'domain' => '', 'path' => '', ); } return $blogsToScan; } private function highestCap($caps){ foreach(array('administrator', 'editor', 'author', 'contributor', 'subscriber') as $cap){ if(empty($caps[$cap]) === false && $caps[$cap]){ return $cap; } } return ''; } private function isEditor($caps){ foreach(array('contributor', 'author', 'editor', 'administrator') as $cap){ if(empty($caps[$cap]) === false && $caps[$cap]){ return true; } } return false; } private function scan_passwds_init(){ $this->statusIDX['passwds'] = wordfence::statusStart('Scanning for weak passwords'); global $wpdb; $wfdb = new wfDB(); $res1 = $wfdb->querySelect("select ID from " . $wpdb->users); $counter = 0; foreach($res1 as $rec){ $this->userPasswdQueue .= pack('N', $rec['ID']); $counter++; } wordfence::status(2, 'info', "Starting password strength check on $counter users."); } private function scan_passwds_main(){ global $wpdb; $wfdb = new wfDB(); while(strlen($this->userPasswdQueue) > 3){ $usersLeft = strlen($this->userPasswdQueue) / 4; //4 byte ints if($usersLeft % 100 == 0){ wordfence::status(2, 'info', "Total of $usersLeft users left to process in password strength check."); } $userID = unpack('N', substr($this->userPasswdQueue, 0, 4)); $userID = $userID[1]; $this->userPasswdQueue = substr($this->userPasswdQueue, 4); $userLogin = $wfdb->querySingle("select user_login from $wpdb->users where ID=%s", $userID); if(! $userLogin){ wordfence::status(2, 'error', "Could not get username for user with ID $userID when checking password strenght."); continue; } wordfence::status(4, 'info', "Checking password strength for user $userLogin with ID $userID"); if($this->scanUserPassword($userID)){ $this->passwdHasIssues = true; } $this->forkIfNeeded(); } } private function scan_passwds_finish(){ wordfence::statusEnd($this->statusIDX['passwds'], $this->passwdHasIssues); } public function scanUserPassword($userID){ require_once( ABSPATH . 'wp-includes/class-phpass.php'); $passwdHasher = new PasswordHash(8, TRUE); $userDat = get_userdata($userID); $this->status(4, 'info', "Checking password strength of user '" . $userDat->user_login . "'"); $highCap = $this->highestCap($userDat->wp_capabilities); if($this->isEditor($userDat->wp_capabilities)){ $shortMsg = "User \"" . $userDat->user_login . "\" with \"" . $highCap . "\" access has an easy password."; $longMsg = "A user with the a role of '" . $highCap . "' has a password that is easy to guess. Please change this password yourself or ask the user to change it."; $level = 1; $words = $this->dictWords; } else { $shortMsg = "User \"" . $userDat->user_login . "\" with 'subscriber' access has a very easy password."; $longMsg = "A user with 'subscriber' access has a password that is very easy to guess. Please either change it or ask the user to change their password."; $level = 2; $words = array($userDat->user_login); } $haveIssue = false; for($i = 0; $i < sizeof($words); $i++){ if($passwdHasher->CheckPassword($words[$i], $userDat->user_pass)){ $this->status(2, 'info', "Adding issue " . $shortMsg); if($this->addIssue('easyPassword', $level, $userDat->ID, $userDat->ID . '-' . $userDat->user_pass, $shortMsg, $longMsg, array( 'ID' => $userDat->ID, 'user_login' => $userDat->user_login, 'user_email' => $userDat->user_email, 'first_name' => $userDat->first_name, 'last_name' => $userDat->last_name, 'editUserLink' => wfUtils::editUserLink($userDat->ID) ))){ $haveIssue = true; } break; } } $this->status(4, 'info', "Completed checking password strength of user '" . $userDat->user_login . "'"); return $haveIssue; } /* private function scan_sitePages(){ if(is_multisite()){ return; } //Multisite not supported by this function yet $this->statusIDX['sitePages'] = wordfence::statusStart("Scanning externally for malware"); $resp = wp_remote_get(site_url()); if(is_array($resp) && isset($resp['body']) && strlen($rep['body']) > 0){ $this->hoover = new wordfenceURLHoover($this->apiKey, $this->wp_version); $this->hoover->hoover(1, $rep['body']); $hooverResults = $this->hoover->getBaddies(); if($this->hoover->errorMsg){ wordfence::statusEndErr(); throw new Exception($this->hoover->errorMsg); } $badURLs = array(); foreach($hooverResults as $idString => $hresults){ foreach($hresults as $result){ if(! in_array($result['URL'], $badURLs)){ $badURLs[] = $result['URL']; } } } if(sizeof($badURLs) > 0){ $this->addIssue('badSitePage', 1, 'badSitePage1', 'badSitePage1', "Your home page contains a malware URL"); } } } */ private function scan_diskSpace(){ $this->statusIDX['diskSpace'] = wordfence::statusStart("Scanning to check available disk space"); wfUtils::errorsOff(); $total = @disk_total_space('.'); $free = @disk_free_space('.'); wfUtils::errorsOn(); if( (! $total) || (! $free )){ //If we get zeros it's probably not reading right. If free is zero then we're out of space and already in trouble. wordfence::statusEnd($this->statusIDX['diskSpace'], false); return; } $this->status(2, 'info', "Total disk space: " . sprintf('%.4f', ($total / 1024 / 1024 / 1024)) . "GB -- Free disk space: " . sprintf('%.4f', ($free / 1024 / 1024 / 1024)) . "GB"); $freeMegs = sprintf('%.2f', $free / 1024 / 1024); $this->status(2, 'info', "The disk has $freeMegs MB space available"); if($freeMegs < 5){ $level = 1; } else if($freeMegs < 20){ $level = 2; } else { wordfence::statusEnd($this->statusIDX['diskSpace'], false); return; } if($this->addIssue('diskSpace', $level, 'diskSpace' . $level, 'diskSpace' . $level, "You have $freeMegs" . "MB disk space remaining", "You only have $freeMegs" . " Megabytes of your disk space remaining. Please free up disk space or your website may stop serving requests.", array( 'spaceLeft' => $freeMegs . "MB" ))){ wordfence::statusEnd($this->statusIDX['diskSpace'], true); } else { wordfence::statusEnd($this->statusIDX['diskSpace'], false); } } private function scan_dns(){ if(! function_exists('dns_get_record')){ $this->status(1, 'info', "Skipping DNS scan because this system does not support dns_get_record()"); return; } $this->statusIDX['dns'] = wordfence::statusStart("Scanning DNS for unauthorized changes"); $haveIssues = false; $home = get_home_url(); if(preg_match('/https?:\/\/([^\/]+)/i', $home, $matches)){ $host = strtolower($matches[1]); $this->status(2, 'info', "Starting DNS scan for $host"); $cnameArrRec = @dns_get_record($host, DNS_CNAME); $cnameArr = array(); $cnamesWeMustTrack = array(); if ($cnameArrRec) { foreach($cnameArrRec as $elem){ $this->status(2, 'info', "Scanning CNAME DNS record for " . $elem['host']); if($elem['host'] == $host){ $cnameArr[] = $elem; $cnamesWeMustTrack[] = $elem['target']; } } } function wfAnonFunc1($a){ return $a['host'] . ' points to ' . $a['target']; } $cnameArr = array_map('wfAnonFunc1', $cnameArr); sort($cnameArr, SORT_STRING); $currentCNAME = implode(', ', $cnameArr); $loggedCNAME = wfConfig::get('wf_dnsCNAME'); $dnsLogged = wfConfig::get('wf_dnsLogged', false); $msg = "A change in your DNS records may indicate that a hacker has hacked into your DNS administration system and has pointed your email or website to their own server for malicious purposes. It could also indicate that your domain has expired. If you made this change yourself you can mark it 'resolved' and safely ignore it."; if($dnsLogged && $loggedCNAME != $currentCNAME){ if($this->addIssue('dnsChange', 2, 'dnsChanges', 'dnsChanges', "Your DNS records have changed", "We have detected a change in the CNAME records of your DNS configuration for the domain $host. A CNAME record is an alias that is used to point a domain name to another domain name. For example foo.example.com can point to bar.example.com which then points to an IP address of 10.1.1.1. $msg", array( 'type' => 'CNAME', 'host' => $host, 'oldDNS' => $loggedCNAME, 'newDNS' => $currentCNAME ))){ $haveIssues = true; } } wfConfig::set('wf_dnsCNAME', $currentCNAME); $aArrRec = dns_get_record($host, DNS_A); $aArr = array(); foreach($aArrRec as $elem){ $this->status(2, 'info', "Scanning DNS A record for " . $elem['host']); if($elem['host'] == $host || in_array($elem['host'], $cnamesWeMustTrack) ){ $aArr[] = $elem; } } function wfAnonFunc2($a){ return $a['host'] . ' points to ' . $a['ip']; } $aArr = array_map('wfAnonFunc2', $aArr); sort($aArr, SORT_STRING); $currentA = implode(', ', $aArr); $loggedA = wfConfig::get('wf_dnsA'); $dnsLogged = wfConfig::get('wf_dnsLogged', false); if($dnsLogged && $loggedA != $currentA){ if($this->addIssue('dnsChange', 2, 'dnsChanges', 'dnsChanges', "Your DNS records have changed", "We have detected a change in the A records of your DNS configuration that may affect the domain $host. An A record is a record in DNS that points a domain name to an IP address. $msg", array( 'type' => 'A', 'host' => $host, 'oldDNS' => $loggedA, 'newDNS' => $currentA ))){ $haveIssues = true; } } wfConfig::set('wf_dnsA', $currentA); $mxArrRec = dns_get_record($host, DNS_MX); $mxArr = array(); foreach($mxArrRec as $elem){ $this->status(2, 'info', "Scanning DNS MX record for " . $elem['host']); if($elem['host'] == $host){ $mxArr[] = $elem; } } function wfAnonFunc3($a){ return $a['target']; } $mxArr = array_map('wfAnonFunc3', $mxArr); sort($mxArr, SORT_STRING); $currentMX = implode(', ', $mxArr); $loggedMX = wfConfig::get('wf_dnsMX'); if($dnsLogged && $loggedMX != $currentMX){ if($this->addIssue('dnsChange', 2, 'dnsChanges', 'dnsChanges', "Your DNS records have changed", "We have detected a change in the email server (MX) records of your DNS configuration for the domain $host. $msg", array( 'type' => 'MX', 'host' => $host, 'oldDNS' => $loggedMX, 'newDNS' => $currentMX ))){ $haveIssues = true; } } wfConfig::set('wf_dnsMX', $currentMX); wfConfig::set('wf_dnsLogged', 1); } wordfence::statusEnd($this->statusIDX['dns'], $haveIssues); } /** * */ private function scan_oldVersions(){ $this->statusIDX['oldVersions'] = wordfence::statusStart("Scanning for old themes, plugins and core files"); $haveIssues = false; $update_check = new wfUpdateCheck(); $update_check->checkAllUpdates(); // WordPress core updates needed if ($update_check->needsCoreUpdate()) { if ($this->addIssue('wfUpgrade', 1, 'wfUpgrade' . $update_check->getCoreUpdateVersion(), 'wfUpgrade' . $update_check->getCoreUpdateVersion(), "Your WordPress version is out of date", "WordPress version " . $update_check->getCoreUpdateVersion() . " is now available. Please upgrade immediately to get the latest security updates from WordPress.", array( 'currentVersion' => $this->wp_version, 'newVersion' => $update_check->getCoreUpdateVersion(), )) ) { $haveIssues = true; } } // Plugin updates needed if (count($update_check->getPluginUpdates()) > 0) { foreach ($update_check->getPluginUpdates() as $plugin) { $key = 'wfPluginUpgrade' . ' ' . $plugin['pluginFile'] . ' ' . $plugin['newVersion'] . ' ' . $plugin['Version']; if ($this->addIssue('wfPluginUpgrade', 1, $key, $key, "The Plugin \"" . $plugin['Name'] . "\" needs an upgrade.", "You need to upgrade \"" . $plugin['Name'] . "\" to the newest version to ensure you have any security fixes the developer has released.", $plugin)) { $haveIssues = true; } } } // Theme updates needed if (count($update_check->getThemeUpdates()) > 0) { foreach ($update_check->getThemeUpdates() as $theme) { $key = 'wfThemeUpgrade' . ' ' . $theme['Name'] . ' ' . $theme['version'] . ' ' . $theme['newVersion']; if ($this->addIssue('wfThemeUpgrade', 1, $key, $key, "The Theme \"" . $theme['Name'] . "\" needs an upgrade.", "You need to upgrade \"" . $theme['Name'] . "\" to the newest version to ensure you have any security fixes the developer has released.", $theme)) { $haveIssues = true; } } } wordfence::statusEnd($this->statusIDX['oldVersions'], $haveIssues); } public function status($level, $type, $msg){ wordfence::status($level, $type, $msg); } public function addIssue($type, $severity, $ignoreP, $ignoreC, $shortMsg, $longMsg, $templateData){ return $this->i->addIssue($type, $severity, $ignoreP, $ignoreC, $shortMsg, $longMsg, $templateData); } public static function requestKill(){ wfConfig::set('wfKillRequested', time()); } public static function checkForKill(){ $kill = wfConfig::get('wfKillRequested', 0); if($kill && time() - $kill < 600){ //Kill lasts for 10 minutes wordfence::status(10, 'info', "SUM_KILLED:Previous scan was killed successfully."); throw new Exception("Scan was killed on administrator request."); } } public static function startScan($isFork = false){ if(! $isFork){ //beginning of scan wfConfig::inc('totalScansRun'); wfConfig::set('wfKillRequested', 0); wordfence::status(4, 'info', "Entering start scan routine"); if(wfUtils::isScanRunning()){ wfUtils::getScanFileError(); return "A scan is already running. Use the kill link if you would like to terminate the current scan."; } } $timeout = self::getMaxExecutionTime() - 2; //2 seconds shorter than max execution time which ensures that only 2 HTTP processes are ever occupied $testURL = admin_url('admin-ajax.php?action=wordfence_testAjax'); if(! wfConfig::get('startScansRemotely', false)){ $testResult = wp_remote_post($testURL, array( 'timeout' => $timeout, 'blocking' => true, 'sslverify' => false, 'headers' => array() )); wordfence::status(4, 'info', "Test result of scan start URL fetch: " . var_export($testResult, true)); } $cronKey = wfUtils::bigRandomHex(); wfConfig::set('currentCronKey', time() . ',' . $cronKey); if( (! wfConfig::get('startScansRemotely', false)) && (! is_wp_error($testResult)) && is_array($testResult) && strstr($testResult['body'], 'WFSCANTESTOK') !== false){ //ajax requests can be sent by the server to itself $cronURL = 'admin-ajax.php?action=wordfence_doScan&isFork=' . ($isFork ? '1' : '0') . '&cronKey=' . $cronKey; $cronURL = admin_url($cronURL); $headers = array(); wordfence::status(4, 'info', "Starting cron with normal ajax at URL $cronURL"); wp_remote_get( $cronURL, array( 'timeout' => $timeout, //Must be less than max execution time or more than 2 HTTP children will be occupied by scan 'blocking' => true, //Non-blocking seems to block anyway, so we use blocking 'sslverify' => false, 'headers' => $headers ) ); wordfence::status(4, 'info', "Scan process ended after forking."); } else { $cronURL = admin_url('admin-ajax.php'); $cronURL = preg_replace('/^(https?:\/\/)/i', '$1noc1.wordfence.com/scanp/', $cronURL); $cronURL .= '?action=wordfence_doScan&isFork=' . ($isFork ? '1' : '0') . '&cronKey=' . $cronKey; $headers = array(); wordfence::status(4, 'info', "Starting cron via proxy at URL $cronURL"); wp_remote_get( $cronURL, array( 'timeout' => $timeout, //Must be less than max execution time or more than 2 HTTP children will be occupied by scan 'blocking' => true, //Non-blocking seems to block anyway, so we use blocking 'sslverify' => false, 'headers' => $headers ) ); wordfence::status(4, 'info', "Scan process ended after forking."); } return false; //No error } public function processResponse($result){ return false; } public static function getMaxExecutionTime(){ $config = wfConfig::get('maxExecutionTime'); wordfence::status(4, 'info', "Got value from wf config maxExecutionTime: $config"); if(is_numeric($config) && $config >= 10){ wordfence::status(4, 'info', "getMaxExecutionTime() returning config value: $config"); return $config; } $ini = @ini_get('max_execution_time'); wordfence::status(4, 'info', "Got max_execution_time value from ini: $ini"); if(is_numeric($ini) && $ini >= 10){ $ini = floor($ini / 2); wordfence::status(4, 'info', "getMaxExecutionTime() returning half ini value: $ini"); return $ini; } wordfence::status(4, 'info', "getMaxExecutionTime() returning default of: 15"); return 15; } } ?>
Cokiee Shell Web 1.0, Coded By Razor
Neueste Kommentare