Uname: Linux webm005.cluster107.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue Sep 17 08:14:20 UTC 2024 x86_64
User: 6036 (villadal)
Group: 100 (users)
Disabled functions: NONE
Safe mode: On[ PHPinfo ]
//home/villadal/www/wp-content///plugins/wordfence/lib      ( Reset | Go to )
File Name: wordfenceScanner.php
Edit
<?php
require_once(dirname(__FILE__) . '/wordfenceConstants.php');
require_once(
dirname(__FILE__) . '/wordfenceClass.php');
require_once(
dirname(__FILE__) . '/wordfenceURLHoover.php');
class 
wordfenceScanner {
    
/*
     * Mask to return all patterns in the exclusion list.
     * @var int
     */
    
const EXCLUSION_PATTERNS_ALL PHP_INT_MAX;
    
/*
     * Mask for patterns that the user has added.
     */
    
const EXCLUSION_PATTERNS_USER 0x1;
    
/*
     * Mask for patterns that should be excluded from the known files scan.
     */
    
const EXCLUSION_PATTERNS_KNOWN_FILES 0x2;
    
/*
     * Mask for patterns that should be excluded from the malware scan.
     */
    
const EXCLUSION_PATTERNS_MALWARE 0x4;

    
//serialized:
    
protected $path '';
    protected 
$results = []; 
    protected 
$resultFilesByShac = [];
    public 
$errorMsg false;
    protected 
$apiKey false;
    protected 
$wordpressVersion '';
    protected 
$totalFilesScanned 0;
    protected 
$startTime false;
    protected 
$lastStatusTime false;
    protected 
$patterns "";
    protected 
$api false;
    protected static 
$excludePatterns = array();
    protected static 
$builtinExclusions = array(
                                            array(
'pattern' => 'wp\-includes\/version\.php''include' => self::EXCLUSION_PATTERNS_KNOWN_FILES), //Excluded from the known files scan because non-en_US installations will have extra content that fails the check, still in malware scan
                                            
array('pattern' => '(?:wp\-includes|wp\-admin)\/(?:[^\/]+\/+)*(?:\.htaccess|\.htpasswd|php_errorlog|error_log|[^\/]+?\.log|\._|\.DS_Store|\.listing|dwsync\.xml)''include' => self::EXCLUSION_PATTERNS_KNOWN_FILES),
                                            );
    
/** @var wfScanEngine */
    
protected $scanEngine;
    private 
$urlHoover;

    public function 
__sleep(){
        return array(
'path''results''resultFilesByShac''errorMsg''apiKey''wordpressVersion''urlHoover''totalFilesScanned',
            
'startTime''lastStatusTime''patterns''scanEngine');
    }
    public function 
__wakeup(){
    }
    public function 
__construct($apiKey$wordpressVersion$path$scanEngine) {
        
$this->apiKey $apiKey;
        
$this->wordpressVersion $wordpressVersion;
        
$this->api = new wfAPI($this->apiKey$this->wordpressVersion);
        if(
$path[strlen($path) - 1] != '/'){
            
$path .= '/';
        }
        
$this->path $path;
        
$this->scanEngine $scanEngine;
            
        
$this->errorMsg false;
        
//First extract hosts or IPs and their URLs into $this->hostsFound and URL's into $this->urlsFound
        
$options $this->scanEngine->scanController()->scanOptions();
        if (
$options['scansEnabled_fileContentsGSB']) {
            
$this->urlHoover = new wordfenceURLHoover($this->apiKey$this->wordpressVersion);
        }
        else {
            
$this->urlHoover false;
        }
        
        if (
$options['scansEnabled_fileContents']) {
            
$this->setupSigs();
        }
        else {
            
$this->patterns = array();
        }
    }

    
/**
     * Get scan regexes from noc1 and add any user defined regexes, including descriptions, ID's and time added.
     * @todo add caching to this.
     * @throws Exception
     */
    
protected function setupSigs() {
        
$sigData $this->api->call('get_patterns', array(), array());
        if(! (
is_array($sigData) && isset($sigData['rules'])) ){
            throw new 
Exception(__('Wordfence could not get the attack signature patterns from the scanning server.''wordfence'));
        }
        
        if (
is_array($sigData['rules'])) {
            
$wafPatterns = array();
            
$wafCommonStringIndexes = array();
            foreach (
$sigData['rules'] as $key => $signatureRow) {
                list(
$id, , $pattern) = $signatureRow;
                if (empty(
$pattern)) {
                    throw new 
Exception(__('Wordfence received malformed attack signature patterns from the scanning server.''wordfence'));
                }
                
                
$logOnly = (isset($signatureRow[5]) && !empty($signatureRow[5])) ? $signatureRow[5] : false;
                
$commonStringIndexes = (isset($signatureRow[8]) && is_array($signatureRow[8])) ? $signatureRow[8] : array(); 
                if (@
preg_match('/' $pattern '/iS''') === false) {
                    
wordfence::status(1'error'sprintf(__('Regex compilation failed for signature %d''wordfence'), (int) $id));
                    unset(
$sigData['rules'][$key]);
                }
                else if (!
$logOnly) {
                    
$wafPatterns[] = $pattern;
                    
$wafCommonStringIndexes[] = $commonStringIndexes;
                }
            }
        }

        
$userSignatures wfScanner::shared()->userScanSignatures();
        foreach (
$userSignatures as $s) {
            
$sigData['rules'][] = $s;
        }

        
$this->patterns $sigData;
        if (isset(
$this->patterns['signatureUpdateTime'])) {
            
wfConfig::set('signatureUpdateTime'$this->patterns['signatureUpdateTime']);
        }
    }

    
/**
     * Return regular expression to exclude files or false if
     * there is no pattern
     *
     * @param $whichPatterns int Bitmask indicating which patterns to include.
     * @return array|boolean
     */
    
public static function getExcludeFilePattern($whichPatterns self::EXCLUSION_PATTERNS_USER) {
        if (isset(
self::$excludePatterns[$whichPatterns])) {
            return 
self::$excludePatterns[$whichPatterns];
        }
        
        
$exParts = array();
        if ((
$whichPatterns self::EXCLUSION_PATTERNS_USER) > 0)
        {
            
$exParts wfScanner::shared()->userExclusions();
        }
        
        
$exParts array_filter($exParts);
        foreach (
$exParts as $key => &$exPart) {
            
$exPart trim($exPart);
            if (
$exPart === '*') {
                unset(
$exParts[$key]);
                continue;
            }
            
$exPart preg_quote($exPart'/');
            
$exPart preg_replace('/\\\\\*/''.*'$exPart);
        }

        foreach (
self::$builtinExclusions as $pattern) {
            if ((
$pattern['include'] & $whichPatterns) > 0) {
                
$exParts[] = $pattern['pattern'];
            }
        }

        
$exParts array_filter($exParts);
        if (!empty(
$exParts)) {
            
$chunks array_chunk($exParts100);
            
self::$excludePatterns[$whichPatterns] = array();
            foreach (
$chunks as $parts) {
                
self::$excludePatterns[$whichPatterns][] = '/(?:' implode('|'$parts) . ')$/i';
            }
        }
        else {
            
self::$excludePatterns[$whichPatterns] = false;
        }

        return 
self::$excludePatterns[$whichPatterns];
    }

    
/**
     * @param wfScanEngine $forkObj
     * @return array
     */
    
public function scan($forkObj){
        
$this->scanEngine $forkObj;
        
$loader $this->scanEngine->getKnownFilesLoader();
        if(! 
$this->startTime){
            
$this->startTime microtime(true);
        }
        if(! 
$this->lastStatusTime){
            
$this->lastStatusTime microtime(true);
        }
        
        
//The site's own URL is checked in an earlier scan stage so we exclude it here.
        
$options $this->scanEngine->scanController()->scanOptions();
        
$hooverExclusions = array();
        if (
$options['scansEnabled_fileContentsGSB']) {
            
$hooverExclusions wordfenceURLHoover::standardExcludedHosts();
        }
        
        
$backtrackLimit ini_get('pcre.backtrack_limit');
        if (
is_numeric($backtrackLimit)) {
            
$backtrackLimit = (int) $backtrackLimit;
            if (
$backtrackLimit 10000000) {
                
ini_set('pcre.backtrack_limit'1000000);
                
wordfence::status(4'info'sprintf(/* translators: PHP ini setting (number). */ __('Backtrack limit is %d, reducing to 1000000''wordfence'), $backtrackLimit));
            }
        }
        else {
            
$backtrackLimit false;
        }
        
        
$lastCount 'whatever';
        
$excludePatterns self::getExcludeFilePattern(self::EXCLUSION_PATTERNS_USER self::EXCLUSION_PATTERNS_MALWARE); 
        while (
true) {
            
$thisCount wordfenceMalwareScanFile::countRemaining();
            if (
$thisCount == $lastCount) {
                
//count should always be decreasing. If not, we're in an infinite loop so lets catch it early
                
wordfence::status(4'info'__('Detected loop in malware scan, aborting.''wordfence'));
                break;
            }
            
$lastCount $thisCount;
            
            
$files wordfenceMalwareScanFile::files();
            if (
count($files) < 1) {
                
wordfence::status(4'info'__('No files remaining for malware scan.''wordfence'));
                break;
            }
            
            
$completed = [];
            foreach (
$files as $record) {
                
$file $record->filename;
                if (
$excludePatterns) {
                    foreach (
$excludePatterns as $pattern) {
                        if (
preg_match($pattern$file)) {
                            
$completed[] = $record;
                            continue 
2;
                        }
                    }
                }
                if (!
file_exists($record->realPath)) {
                    
$completed[] = $record;
                    continue;
                }
                
$fileSum $record->newMD5;
                
                
$fileExt '';
                if(
preg_match('/\.([a-zA-Z\d\-]{1,7})$/'$file$matches)){
                    
$fileExt strtolower($matches[1]);
                }
                
$isPHP false;
                if(
preg_match('/\.(?:php(?:\d+)?|phtml)(\.|$)/i'$file)) {
                    
$isPHP true;
                }
                
$isHTML false;
                if(
preg_match('/\.(?:html?)(\.|$)/i'$file)) {
                    
$isHTML true;
                }
                
$isJS false;
                if(
preg_match('/\.(?:js|svg)(\.|$)/i'$file)) {
                    
$isJS true;
                }
                
$dontScanForURLs false;
                if (!
$options['scansEnabled_highSense'] && (preg_match('/^(?:\.htaccess|wp\-config\.php)$/'$file) || $file === ini_get('user_ini.filename'))) {
                    
$dontScanForURLs true;
                }
                
                
$isScanImagesFile false;
                if (!
$isPHP && preg_match('/^(?:jpg|jpeg|mp3|avi|m4v|mov|mp4|gif|png|tiff?|svg|sql|js|tbz2?|bz2?|xz|zip|tgz|gz|tar|log|err\d+)$/'$fileExt)) {
                    if (
$options['scansEnabled_scanImages']) {
                        
$isScanImagesFile true;
                    }
                    else if (!
$isJS) {
                        
$completed[] = $record;
                        continue;
                    }
                }
                
$isHighSensitivityFile false;
                if (
strtolower($fileExt) == 'sql') {
                    if (
$options['scansEnabled_highSense']) {
                        
$isHighSensitivityFile true;
                    }
                    else {
                        
$completed[] = $record;
                        continue;
                    }
                }
                if(
wfUtils::fileTooBig($record->realPath$fsize$fh)){ //We can't use filesize on 32 bit systems for files > 2 gigs
                    //We should not need this check because files > 2 gigs are not hashed and therefore won't be received back as unknowns from the API server
                    //But we do it anyway to be safe.
                    
wordfence::status(2'error'sprintf(/* translators: File path. */ __('Encountered file that is too large: %s - Skipping.''wordfence'), $file));
                    
$completed[] = $record;
                    continue;
                }

                
$fsize wfUtils::formatBytes($fsize);
                if (
function_exists('memory_get_usage')) {
                    
wordfence::status(4'info'sprintf(
                        
/* translators: 1. File path. 2. File size. 3. Memory in bytes. */
                        
__('Scanning contents: %1$s (Size: %2$s Mem: %3$s)''wordfence'),
                        
$file,
                        
$fsize,
                        
wfUtils::formatBytes(memory_get_usage(true))
                    ));
                } else {
                    
wordfence::status(4'info'sprintf(
                        
/* translators: 1. File path. 2. File size. */
                        
__('Scanning contents: %1$s (Size: %2$s)''wordfence'),
                        
$file,
                        
$fsize
                    
));
                }

                
$stime microtime(true);
                if (!
$fh) {
                    
$completed[] = $record;
                    continue;
                }
                
$totalRead = (int) $record->stoppedOnPosition;
                if (
$totalRead 0) {
                    if (@
fseek($fh$totalReadSEEK_SET) !== 0) {
                        
$totalRead 0;
                    }
                }
                if (
$totalRead === && @fseek($fh$totalReadSEEK_SET) !== 0) {
                    
wordfence::status(2'error'sprintf(/* translators: File path. */ __('Seek error occurred in file: %s - Skipping.''wordfence'), $file));
                    
$completed[] = $record;
                    continue;
                }

                
$dataForFile $this->dataForFile($file);
                
                
$first true;
                while (!
feof($fh)) {
                    
$data fread($fh1024 1024); //read 1 megs max per chunk
                    
$readSize wfUtils::strlen($data);
                    
$currentPosition $totalRead;
                    
$totalRead += $readSize;
                    if (
$readSize 1) {
                        break;
                    }
                    
                    
$extraMsg '';
                    if (
$isScanImagesFile) {
                        
$extraMsg ' ' __('This file was detected because you have enabled "Scan images, binary, and other files as if they were executable", which treats non-PHP files as if they were PHP code. This option is more aggressive than the usual scans, and may cause false positives.''wordfence');
                    }
                    else if (
$isHighSensitivityFile) {
                        
$extraMsg ' ' __('This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positives.''wordfence');
                    }
                    
                    
$treatAsBinary = ($isPHP || $isHTML || $options['scansEnabled_scanImages']);
                    if (
$options['scansEnabled_fileContents']) {
                        
$allCommonStrings $this->patterns['commonStrings'];
                        
$commonStringsFound array_fill(0count($allCommonStrings), null); //Lazily looked up below

                        
$regexMatched false;
                        foreach (
$this->patterns['rules'] as $rule) {
                            
$stoppedOnSignature $record->stoppedOnSignature;
                            if (!empty(
$stoppedOnSignature)) { //Advance until we find the rule we stopped on last time
                                //wordfence::status(4, 'info', "Searching for malware scan resume point (". $stoppedOnSignature . ") at rule " . $rule[0]);
                                
if ($stoppedOnSignature == $rule[0]) {
                                    
$record->updateStoppedOn(''$currentPosition);
                                    
wordfence::status(4'info'sprintf(/* translators: Malware signature rule ID. */ __('Resuming malware scan at rule %s.''wordfence'), $rule[0]));
                                }
                                continue;
                            }

                            
$type = (isset($rule[4]) && !empty($rule[4])) ? $rule[4] : 'server';
                            
$logOnly = (isset($rule[5]) && !empty($rule[5])) ? $rule[5] : false;
                            
$commonStringIndexes = (isset($rule[8]) && is_array($rule[8])) ? $rule[8] : array();
                            if (
$type == 'server' && !$treatAsBinary) { continue; }
                            else if ((
$type == 'both' || $type == 'browser') && $isJS) { $extraMsg ''; }
                            else if ((
$type == 'both' || $type == 'browser') && !$treatAsBinary) { continue; }

                            if (!
$first && substr($rule[2], 01) == '^') {
                                
//wordfence::status(4, 'info', "Skipping malware signature ({$rule[0]}) because it only applies to the file beginning.");
                                
continue;
                            }

                            foreach (
$commonStringIndexes as $i) {
                                if (
$commonStringsFound[$i] === null) {
                                    
$s $allCommonStrings[$i];
                                    
$commonStringsFound[$i] = (preg_match('/' $s '/i'$data) == 1);
                                }

                                if (!
$commonStringsFound[$i]) {
                                    
//wordfence::status(4, 'info', "Skipping malware signature ({$rule[0]}) due to short circuit.");
                                    
continue 2;
                                }
                            }

                            
/*if (count($commonStringIndexes) > 0) {
                                wordfence::status(4, 'info', "Processing malware signature ({$rule[0]}) because short circuit matched.");
                            }*/

                            
if (preg_match('/(' $rule[2] . ')/iS'$data$matchesPREG_OFFSET_CAPTURE)) {
                                
$customMessage = isset($rule[9]) ? $rule[9] : __('This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans.''wordfence');
                                
$matchString $matches[1][0];
                                
$matchOffset $matches[1][1];
                                
$beforeString wfWAFUtils::substr($datamax(0$matchOffset 100), $matchOffset max(0$matchOffset 100));
                                
$afterString wfWAFUtils::substr($data$matchOffset strlen($matchString), 100);
                                if (!
$logOnly) {
                                    
$this->addResult(array(
                                        
'type' => 'file',
                                        
'severity' => wfIssues::SEVERITY_CRITICAL,
                                        
'ignoreP' => $record->realPath,
                                        
'ignoreC' => $fileSum,
                                        
'shortMsg' => sprintf(__('File appears to be malicious or unsafe: %s''wordfence'), esc_html($record->getDisplayPath())),
                                        
'longMsg' => $customMessage ' ' sprintf(__('The matched text in this file is: %s''wordfence'), '<strong style="color: #F00;" class="wf-split-word">' wfUtils::potentialBinaryStringToHTML((wfUtils::strlen($matchString) > 200 wfUtils::substr($matchString0200) . '...' $matchString)) . '</strong>') . ' ' '<br><br>' sprintf(/* translators: Scan result type. */ __('The issue type is: %s''wordfence'), '<strong>' esc_html($rule[7]) . '</strong>') . '<br>' sprintf(/* translators: Scan result description. */ __('Description: %s''wordfence'), '<strong>' esc_html($rule[3]) . '</strong>') . $extraMsg,
                                        
'data' => array_merge(array(
                                            
'file' => $file,
                                            
'realFile' => $record->realPath,
                                            
'shac' => $record->SHAC,
                                            
'highSense' => $options['scansEnabled_highSense']
                                        ), 
$dataForFile),
                                    ));
                                }
                                
$regexMatched true;
                                
$this->scanEngine->recordMetric('malwareSignature'$rule[0], array('file' => substr($file0255), 'match' => substr($matchString065535), 'before' => $beforeString'after' => $afterString'md5' => $record->newMD5'shac' => $record->SHAC), false);
                                break;
                            }

                            if (
$forkObj->shouldFork()) {
                                
$record->updateStoppedOn($rule[0], $currentPosition);
                                
fclose($fh);

                                
wordfenceMalwareScanFile::markCompleteBatch($completed);

                                
wordfence::status(4'info'sprintf(/* translators: Malware signature rule ID. */ __('Forking during malware scan (%s) to ensure continuity.''wordfence'), $rule[0]));
                                
$forkObj->fork(); //exits
                            
}
                        }
                        if (
$regexMatched) { break; }
                        if (
$treatAsBinary && $options['scansEnabled_highSense']) {
                            
$badStringFound false;
                            if (
strpos($data$this->patterns['badstrings'][0]) !== false) {
                                for (
$i 1$i sizeof($this->patterns['badstrings']); $i++) {
                                    if (
wfUtils::strpos($data$this->patterns['badstrings'][$i]) !== false) {
                                        
$badStringFound $this->patterns['badstrings'][$i];
                                        break;
                                    }
                                }
                            }
                            if (
$badStringFound) {
                                
$this->addResult(array(
                                    
'type' => 'file',
                                    
'severity' => wfIssues::SEVERITY_CRITICAL,
                                    
'ignoreP' => $record->realPath,
                                    
'ignoreC' => $fileSum,
                                    
'shortMsg' => __('This file may contain malicious executable code: ''wordfence') . esc_html($record->getDisplayPath()),
                                    
'longMsg' => sprintf(/* translators: Malware signature matched text. */ __('This file is a PHP executable file and contains the word "eval" (without quotes) and the word "%s" (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code. If you know about this file you can choose to ignore it to exclude it from future scans. This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positives.''wordfence'), '<span class="wf-split-word">' esc_html($badStringFound) . '</span>'),
                                     
'data' => array_merge(array(
                                        
'file' => $file,
                                        
'realFile' => $record->realPath,
                                        
'shac' => $record->SHAC,
                                        
'highSense' => $options['scansEnabled_highSense']
                                    ), 
$dataForFile),
                                ));
                                break;
                            }
                        }
                    }
                    
                    if (!
$dontScanForURLs && $options['scansEnabled_fileContentsGSB']) {
                        
$found $this->urlHoover->hoover($file$data$hooverExclusions);
                        
$this->scanEngine->scanController()->incrementSummaryItem(wfScanner::SUMMARY_SCANNED_URLS$found);
                    }
                    
                    if (
$totalRead 1024 1024) {
                        break;
                    }
                    
                    
$first false;
                }
                
fclose($fh);
                
$this->totalFilesScanned++;
                if(
microtime(true) - $this->lastStatusTime 1){
                    
$this->lastStatusTime microtime(true);
                    
$this->writeScanningStatus();
                }
                
                
$completed[] = $record;
                
$shouldFork $forkObj->shouldFork();
                if (
$shouldFork || count($completed) > 100) {
                    
wordfenceMalwareScanFile::markCompleteBatch($completed);
                    
$completed = [];
                    if (
$shouldFork) {
                        
wordfence::status(4'info'__("Forking during malware scan to ensure continuity."'wordfence'));
                        
$forkObj->fork();
                    }
                }
            }
            
wordfenceMalwareScanFile::markCompleteBatch($completed);
        }
        
$this->writeScanningStatus();
        if (
$options['scansEnabled_fileContentsGSB']) {
            
wordfence::status(2'info'__('Asking Wordfence to check URLs against malware list.''wordfence'));
            
$hooverResults $this->urlHoover->getBaddies();
            if(
$this->urlHoover->errorMsg){
                
$this->errorMsg $this->urlHoover->errorMsg;
                if (
$backtrackLimit !== false) { ini_set('pcre.backtrack_limit'$backtrackLimit); }
                return 
false;
            }
            
$this->urlHoover->cleanup();
            
            foreach(
$hooverResults as $file => $hresults){
                
$record wordfenceMalwareScanFile::fileForPath($file);
                
$dataForFile $this->dataForFile($file$record->realPath);
    
                foreach(
$hresults as $result){
                    if(
preg_match('/wfBrowscapCache\.php$/'$file)){
                        continue;
                    }
                    
                    if (empty(
$result['URL'])) {
                        continue; 
                    }
                    
                    if (
$result['badList'] == 'wordfence-dbl') {
                        
$this->addResult(array(
                            
'type' => 'file',
                            
'severity' => wfIssues::SEVERITY_CRITICAL,
                            
'ignoreP' => $record->realFile,
                            
'ignoreC' => md5_file($record->realPath),
                            
'shortMsg' => __('File contains suspected malware URL: ''wordfence') . esc_html($record->getDisplayPath()),
                            
'longMsg' => __('This file contains a URL that is currently listed on Wordfence\'s domain blocklist. The URL is: ''wordfence') . esc_html($result['URL']),
                            
'data' => array_merge(array(
                                
'file' => $file,
                                
'realFile' => $record->realPath,
                                
'shac' => $record->SHAC,
                                
'badURL' => $result['URL'],
                                
'gsb' => 'wordfence-dbl',
                                
'highSense' => $options['scansEnabled_highSense']
                            ), 
$dataForFile),
                        ));
                    }
                }
            }
        }
        
wfUtils::afterProcessingFile();
        
        
wordfence::status(4'info'__('Finalizing malware scan results''wordfence'));
        
        if (!empty(
$this->results)) {
            
$safeFiles $this->scanEngine->isSafeFile(array_keys($this->resultFilesByShac));
            foreach (
$safeFiles as $hash) {
                foreach (
$this->resultFilesByShac[$hash] as $file)
                    unset(
$this->results[$file]);
            }
        }
        
        if (
$backtrackLimit !== false) { ini_set('pcre.backtrack_limit'$backtrackLimit); }
        return 
$this->results;
    }

    protected function 
writeScanningStatus() {
        
wordfence::status(2'info'sprintf(
            
/* translators: 1. Number of fils. 2. Seconds in millisecond precision. */
            
__('Scanned contents of %1$d additional files at %2$.2f per second''wordfence'),
            
$this->totalFilesScanned,
            (
$this->totalFilesScanned / (microtime(true) - $this->startTime))
        ));
    }

    protected function 
addResult($result) {
        if (isset(
$result['data']['file'])) {
            
$file $result['data']['file'];
            
$existing array_key_exists($file$this->results) ? $this->results[$file] : null;
            if (
$existing === null || $existing['severity'] > $result['severity']) {
                
$this->results[$file] = $result;
                if (isset(
$result['data']['shac'])) {
                    
$shac $result['data']['shac'];
                    if (!
array_key_exists($shac$this->resultFilesByShac))
                        
$this->resultFilesByShac[$shac] = [];
                    
$this->resultFilesByShac[$shac][] = $file;
                }
            }
        }
        else {
            
$this->results[] = $result;
        }
    }

    
/**
     * @param string $file
     * @return array
     */
    
private function dataForFile($file$fullPath null) {
        
$loader $this->scanEngine->getKnownFilesLoader();
        
$data = array();
        if (
$isKnownFile $loader->isKnownFile($file)) {
            if (
$loader->isKnownCoreFile($file)) {
                
$data['cType'] = 'core';

            } else if (
$loader->isKnownPluginFile($file)) {
                
$data['cType'] = 'plugin';
                list(
$itemName$itemVersion$cKey) = $loader->getKnownPluginData($file);
                
$data array_merge($data, array(
                    
'cName'    => $itemName,
                    
'cVersion' => $itemVersion,
                    
'cKey'     => $cKey
                
));

            } else if (
$loader->isKnownThemeFile($file)) {
                
$data['cType'] = 'theme';
                list(
$itemName$itemVersion$cKey) = $loader->getKnownThemeData($file);
                
$data array_merge($data, array(
                    
'cName'    => $itemName,
                    
'cVersion' => $itemVersion,
                    
'cKey'     => $cKey
                
));
            }
        }
        
        
$suppressDelete false;
        
$canRegenerate false;
        if (
$fullPath !== null) {
            
$bootstrapPath wordfence::getWAFBootstrapPath();
            
$htaccessPath wfUtils::getHomePath() . '.htaccess';
            
$userIni ini_get('user_ini.filename');
            
$userIniPath false;
            if (
$userIni) {
                
$userIniPath wfUtils::getHomePath() . $userIni;
            }
            
            if (
$fullPath == $htaccessPath) {
                
$suppressDelete true;    
            }
            else if (
$userIniPath !== false && $fullPath == $userIniPath) {
                
$suppressDelete true;
            }
            else if (
$fullPath == $bootstrapPath) {
                
$suppressDelete true;
                
$canRegenerate true;
            }
        }
        
        
$localFile realpath($this->path $file);
        
$isWPConfig $localFile === ABSPATH 'wp-config.php';

        
$data['canDiff'] = $isKnownFile;
        
$data['canFix'] = $isKnownFile && !$isWPConfig;
        
$data['canDelete'] = !$isKnownFile && !$canRegenerate && !$suppressDelete && !$isWPConfig;
        
$data['canRegenerate'] = $canRegenerate && !$isWPConfig;
        
$data['wpconfig'] = $isWPConfig;

        return 
$data;
    }
}

/**
 * Convenience class for interfacing with the wfFileMods table.
 * 
 * @property string $filename
 * @property string $filenameMD5
 * @property string $newMD5
 * @property string $SHAC
 * @property string $stoppedOnSignature
 * @property string $stoppedOnPosition
 * @property string $isSafeFile
 */
class wordfenceMalwareScanFile {
    protected 
$_filename;
    protected 
$_realPath;
    protected 
$_filenameMD5;
    protected 
$_filenameMD5Hex;
    protected 
$_newMD5;
    protected 
$_shac;
    protected 
$_stoppedOnSignature;
    protected 
$_stoppedOnPosition;
    protected 
$_isSafeFile;
    
    protected static function 
getDB() {
        static 
$db null;
        if (
$db === null) {
            
$db = new wfDB();
        }
        return 
$db;
    }
    
    public static function 
countRemaining() {
        
$db self::getDB();
        return 
$db->querySingle("SELECT COUNT(*) FROM " wfDB::networkTable('wfFileMods') . " WHERE oldMD5 != newMD5 AND knownFile = 0");
    }
    
    public static function 
files($limit 500) {
        
$db self::getDB();
        
$result $db->querySelect("SELECT filename, real_path, filenameMD5, HEX(newMD5) AS newMD5, HEX(SHAC) AS SHAC, stoppedOnSignature, stoppedOnPosition, isSafeFile FROM " wfDB::networkTable('wfFileMods') . " WHERE oldMD5 != newMD5 AND knownFile = 0 AND isSafeFile != '1' LIMIT %d"$limit);
        
$files = array();
        foreach (
$result as $row) {
            
$files[] = new wordfenceMalwareScanFile($row['filename'], $row['real_path'], $row['filenameMD5'], $row['newMD5'], $row['SHAC'], $row['stoppedOnSignature'], $row['stoppedOnPosition'], $row['isSafeFile']);
        }
        return 
$files;
    }
    
    public static function 
fileForPath($file) {
        
$db self::getDB();
        
$row $db->querySingleRec("SELECT filename, real_path, filenameMD5, HEX(newMD5) AS newMD5, HEX(SHAC) AS SHAC, stoppedOnSignature, stoppedOnPosition, isSafeFile FROM " wfDB::networkTable('wfFileMods') . " WHERE filename = '%s'"$file);
        return new 
wordfenceMalwareScanFile($row['filename'], $row['real_path'], $row['filenameMD5'], $row['newMD5'], $row['SHAC'], $row['stoppedOnSignature'], $row['stoppedOnPosition'], $row['isSafeFile']);
    }
    
    public function 
__construct($filename$realPath$filenameMD5$newMD5$shac$stoppedOnSignature$stoppedOnPosition$isSafeFile) {
        
$this->_filename $filename;
        
$this->_realPath $realPath;
        
$this->_filenameMD5 $filenameMD5;
        
$this->_filenameMD5Hex bin2hex($filenameMD5);
        
$this->_newMD5 $newMD5;
        
$this->_shac strtoupper($shac);
        
$this->_stoppedOnSignature $stoppedOnSignature;
        
$this->_stoppedOnPosition $stoppedOnPosition;
        
$this->_isSafeFile $isSafeFile;
    }
    
    public function 
__get($key) {
        switch (
$key) {
            case 
'filename':
                return 
$this->_filename;
            case 
'realPath':
                return 
$this->_realPath;
            case 
'filenameMD5':
                return 
$this->_filenameMD5;
            case 
'filenameMD5Hex':
                return 
$this->_filenameMD5Hex;
            case 
'newMD5':
                return 
$this->_newMD5;
            case 
'SHAC':
                return 
$this->_shac;
            case 
'stoppedOnSignature':
                return 
$this->_stoppedOnSignature;
            case 
'stoppedOnPosition':
                return 
$this->_stoppedOnPosition;
            case 
'isSafeFile':
                return 
$this->_isSafeFile;
        }
    }
    
    public function 
__toString() {
        return 
"Record [filename: {$this->filename}, realPath: {$this->realPath}, filenameMD5: {$this->filenameMD5}, newMD5: {$this->newMD5}, stoppedOnSignature: {$this->stoppedOnSignature}, stoppedOnPosition: {$this->stoppedOnPosition}]";
    }

    public static function 
markCompleteBatch($records) {
        if (empty(
$records))
            return;
        
$db self::getDB();
        
$db->update(
            
wfDB::networkTable('wfFileMods'),
            [
                
'oldMD5' => 'newMD5'
            
],
            [
                
'filenameMD5' => array_map(function($record) { return $record->filenameMD5Hex; }, $records)
            ],
            [
                
'filenameMD5' => 'UNHEX(%s)'
            
]
        );
    }
    
    public function 
updateStoppedOn($signature$position) {
        
$this->_stoppedOnSignature $signature;
        
$this->_stoppedOnPosition $position;
        
$db self::getDB();
        
$db->queryWrite("UPDATE " wfDB::networkTable('wfFileMods') . " SET stoppedOnSignature = '%s', stoppedOnPosition = %d WHERE filenameMD5 = UNHEX(%s)"$this->stoppedOnSignature$this->stoppedOnPosition$this->filenameMD5Hex);
    }
    
    public function 
getDisplayPath() {
        if (
preg_match('#(^|/)..(/|$)#'$this->filename))
            return 
$this->realPath;
        return 
$this->filename;
    }

}

All system for education purposes only. For more tools: Telegram @jackleet

Mr.X Private Shell

Logo
-
New File | New Folder
Command
SQL