• Resolved Zsader

    (@zsader)


    Hi downloaded the zip for this plugin. And then I unzipped them. And I wanted to check all of the files just in case. I like to be cautious. For some of the files, particularly in the admin folder. I’m coming across some virus detentions, it’s called VEX7B24.webshell or some other variations.

    I’m just wondering what line of code can be taken out or rewritten to remove that detection?

    Should I worry about it, is it a false positive or a back door into my website?
    Here are some of the files:

    File name: wp-security-filesystem-menu.php
    SHA256: cb364c34db9f0b21eae361db1f2c085594a3040b83e8601c1dde7cfebd38040b
    Bkav VEX7B24.Webshell 20160312

    File name: wp-security-brute-force-menu.php
    SHA256: b62e7a7ed8bd27ab5aff53f9de71ebebf5bfeb282f7e5f8f7676650a127ce00a
    Bkav VEX72AF.Webshell 20160312

    File name: wp-security-database-menu.php
    SHA256: e6f63995d7d5b21d4b46d604e76196877926d45559066120fbb86990d2598740
    Bkav VEX4FA7.Webshell 20160129
    Detection ratio: 1 / 54

    File name: wp-security-filesystem-menu.php
    SHA256: cb364c34db9f0b21eae361db1f2c085594a3040b83e8601c1dde7cfebd38040b
    Detection ratio: 1 / 56
    Bkav VEX7B24.Webshell 20160312

    File name: wp-security-user-login-menu.php
    SHA256: 380cf49e32bcbcb8a8dcf41d7147619494b93ffd61900de6f9a4a07495fe14b8
    Detection ratio: 1 / 55
    Bkav VEX9DCD.Webshell 20160224

    I’m sort of finding this regularly. Even though someone could say it’s a false positive. Only a coder can be 100% sure on this and fix this. If I could have some insight on this, thank you. I’m just afraid to install anything like this, even if it shows one false positive.

    I could take out some coding lines one by one, until I find the one were the detection goes away. And I could give you the coding to see why it does it for that particular coding. Or if anyone can give me some insight on it.

    https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/

Viewing 5 replies - 1 through 5 (of 5 total)
  • Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi, this plugin does not contain any malware, spamware or any virus. I have been using this plugin on all my sites for many years without any issues.

    Just to make sure I tested one of my sites using virustotal. It reported nothing bad and it the site is clean. Have you checked with your host to make sure your site has not been hacked?

    If you think your site has been hacked, you might like to read the following instructions from [wordpress.org].

    Thread Starter Zsader

    (@zsader)

    Just to make sure I tested one of my sites using virustotal. It reported nothing bad and it the site is clean. Have you checked with your host to make sure your site has not been hacked?

    I haven’t installed the plugin yet. I’m just scanning the plugin folder itself in the zip. I want to be safe, so I’m staying on the side of caution before I even install.

    I’m figuring out what part of the coding right now is popping up this detection.

    Do me a favor go into your ftp wordpress site, go into the plugin directory, extract “wp-security-brute-force-menu.php” and put it in virustotal and see if anything comes up.

    In fact, I found parts of the coding that are triggering the detection. all you have to do is put the coding into a wordpad and save it, and it will pop up a result on virustotal. Here is the code: *I’m still trying to find the exact lines. It’s not going to be easy. I know there is two lines. Not just one.

    `<h2><?php _e(‘Brute Force Prevention Firewall Settings’, ‘all-in-one-wp-security-and-firewall’)?></h2>

    <div class=”aio_blue_box”>
    <?php
    //TODO – need to fix the following message
    echo ‘<p>’.__(‘A Brute Force Attack is when a hacker tries many combinations of usernames and passwords until they succeed in guessing the right combination.’, ‘all-in-one-wp-security-and-firewall’).
    ‘<br />’.__(‘Due to the fact that at any one time there may be many concurrent login attempts occurring on your site via malicious automated robots, this also has a negative impact on your server\’s memory and performance.’, ‘all-in-one-wp-security-and-firewall’).
    ‘<br />’.__(‘The features in this tab will stop the majority of Brute Force Login Attacks at the .htaccess level thus providing even better protection for your WP login page and also reducing the load on your server because the system does not have to run PHP code to process the login attempts.’, ‘all-in-one-wp-security-and-firewall’).'</p>’;
    ?>
    </div>
    <div class=”aio_yellow_box”>
    <?php
    $backup_tab_link = ‘<a href=”admin.php?page=’.AIOWPSEC_SETTINGS_MENU_SLUG.’&tab=tab2″ target=”_blank”>backup</a>’;
    $video_link = ‘<a href=”http://www.tipsandtricks-hq.com/all-in-one-wp-security-plugin-cookie-based-brute-force-login-attack-prevention-feature-5994&#8243; target=”_blank”>video tutorial</a>’;
    $info_msg = sprintf( __(‘Even though this feature should not have any impact on your site\’s general functionality <strong>you are strongly encouraged to take a %s of your .htaccess file before proceeding</strong>.’, ‘all-in-one-wp-security-and-firewall’), $backup_tab_link);
    $info_msg1 = __(‘If this feature is not used correctly, you can get locked out of your site. A backed up .htaccess file will come in handy if that happens.’, ‘all-in-one-wp-security-and-firewall’);
    $info_msg2 = sprintf( __(‘To learn more about how to use this feature please watch the following %s.’, ‘all-in-one-wp-security-and-firewall’), $video_link);
    $brute_force_login_feature_link = ‘<a href=”admin.php?page=’.AIOWPSEC_FIREWALL_MENU_SLUG.’&tab=tab4″ target=”_blank”>Cookie-Based Brute Force Login Prevention</a>’;
    echo ‘<p>’.$info_msg.
    ‘<br />’.$info_msg1.
    ‘<br />’.$info_msg2.'</p>’;
    ?>
    </div>
    <?php

    <div class=”inside”>
    <?php
    //Display security info badge
    global $aiowps_feature_mgr;
    $aiowps_feature_mgr->output_feature_details_badge(“firewall-enable-brute-force-attack-prevention”);
    ?>
    <form action=”” method=”POST”>
    <?php wp_nonce_field(‘aiowpsec-enable-cookie-based-brute-force-prevention’); ?>
    <table class=”form-table”>
    <tr valign=”top”>
    <th scope=”row”><?php _e(‘Enable Brute Force Attack Prevention’, ‘all-in-one-wp-security-and-firewall’)?>:</th>
    <td>
    <input name=”aiowps_enable_brute_force_attack_prevention” type=”checkbox”<?php if($aio_wp_security->configs->get_value(‘aiowps_enable_brute_force_attack_prevention’)==’1′) echo ‘ checked=”checked”‘; ?> value=”1″/>
    <span class=”description”><?php _e(‘Check this if you want to protect your login page from Brute Force Attack.’, ‘all-in-one-wp-security-and-firewall’); ?></span>
    <span class=”aiowps_more_info_anchor”><span class=”aiowps_more_info_toggle_char”>+</span><span class=”aiowps_more_info_toggle_text”><?php _e(‘More Info’, ‘all-in-one-wp-security-and-firewall’); ?></span></span>
    <div class=”aiowps_more_info_body”>
    <p class=”description”>
    <?php
    _e(‘This feature will deny access to your WordPress login page for all people except those who have a special cookie in their browser.’, ‘all-in-one-wp-security-and-firewall’);
    echo ‘<br />’;
    _e(‘To use this feature do the following:’, ‘all-in-one-wp-security-and-firewall’);
    echo ‘<br />’;
    _e(‘1) Enable the checkbox.’, ‘all-in-one-wp-security-and-firewall’);
    echo ‘<br />’;
    _e(‘2) Enter a secret word consisting of alphanumeric characters which will be difficult to guess. This secret word will be useful whenever you need to know the special URL which you will use to access the login page (see point below).’, ‘all-in-one-wp-security-and-firewall’);
    echo ‘<br />’;
    _e(‘3) You will then be provided with a special login URL. You will need to use this URL to login to your WordPress site instead of the usual login URL. NOTE: The system will deposit a special cookie in your browser which will allow you access to the WordPress administration login page.’, ‘all-in-one-wp-security-and-firewall’);
    echo ‘<br />’;
    _e(‘Any person trying to access your login page who does not have the special cookie in their browser will be automatically blocked.’, ‘all-in-one-wp-security-and-firewall’);
    ?>
    </p>
    </div>
    </td>

    `

    Plugin Contributor wpsolutions

    (@wpsolutions)

    Hi,
    Neither does the code you listed or the plugin in general contain anything malicious in it.
    Your virus program is giving a false positive.

    Thread Starter Zsader

    (@zsader)

    Hi,
    Neither does the code you listed or the plugin in general contain anything malicious in it.

    Yeah, you are probably right. I just wanted to get rid of the line of coding safely without breaking the plugin. Then install it. Just to get rid of false positive(which it probably is)

    It just gives me piece of mind. It’s impossible to see what line is triggering it. This is an ongoing thing with BKAV. And the word webshell scares the heck out of me.

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Just to add to @wpsolutions comment above and to prove that it is a false positive.

    I carried out another test in virustotal, this time using this plugins zip folder. There was one report found by bkav. Then I went to bkav website and did another scan of the zip folder. The results was all positive, no virus found. This concludes that it is a false positive detection.

    Kind regards

Viewing 5 replies - 1 through 5 (of 5 total)
  • The topic ‘Virustotal reporting VEX7B24.Webshell on some of the plugin files’ is closed to new replies.