Scanning out of date plugins
-
Still cleaning a hacked client… it appears that extra files within plugins are scanned fully to assess whether they are malicious, but the contents of files that belong in the plugin are only examined if the latest version is installed.
Is this the case, or do I just need to get the injected examples to you because they’re supposed to be detected? Settings are scan everything everywhere at high sensitivity, but there are a bunch of files in outdated plugins that have been injected and I only identfied them from going through the web server logs around the time of access of the extra files that Wordfence did spot.
In the case of this client, they’re running a commercial variant of wp-e-commerce which as been further modified for their specific needs so it’s not feasible to whack in the latest version. Since I didn’t do the implementation, it’s not easy to tell if this is true of any of the other plugins there, so I’ve been checking the version of each against known vulnerabilities and ignoring the big red cross against any version thought to be safe. It would seem that wf doesn’t really support this approach – or am I not using it properly?
I’m now opening up my linx toolbag and digging around at command line to approach from another direction.
The topic ‘Scanning out of date plugins’ is closed to new replies.