![]() |
I'd like to know if this is working or how to make it work with 4.2.1 as well.
As Wolver2 said above, it's very important to many of us. Or is there another product that's compatible with 4.2.1?? |
I think its working as I get the emails for 4.2.1 and I get "Infects found: {1}"
BUT I CANNOT SEE WHERE! the emails are all blank lol |
Hmm... after 15 months of using this addon I'm now getting blank emails at 2, 22 and 42 minutes of every hour (which is when the job is scheduled to run).
Haven't installed anything lately so I'm guessing there was/is some sort of infection, however the files are blank. There are no infected addons according to the emails I'm getting, including the first. Any idea? |
Running 4.2.0pl2 and get this response running the cron job regardless of whether demo is active/enabled or not:
The following modules were infected: pluginlist Read through this whole thread, didn't find anything to tell me whether I have a problem or not. Any help? |
Makes me wonder why this isn't built in functionality. :/
|
Quote:
|
1 Attachment(s)
As this has never been updated I have fixed the English version as some of it was not in English and also the grammar was not the best. This is all that I have done
|
I have a question, and can offer some help/advice.
:D I installed this on a known compromised site. I was getting blank emails every 20 minutes. Scheduled Task Log Viewer indicates what a lot of folks prevoiusly posted here on when asking about 'pluginlist' 9957 Check 4 Hacking 12:14, 19th Sep 2013 Infects found: pluginlist 9956 Check 4 Hacking 11:42, 19th Sep 2013 Infects found: pluginlist 9955 Check 4 Hacking 11:22, 19th Sep 2013 Infects found: pluginlist (over and over) I went into phpMyAdmin and ran this query: Code:
SELECT title FROM datastore WHERE data LIKE '%base64%' resultant row: pluginlist Code:
SELECT * FROM `datastore` WHERE `title` = 'pluginlist'; edited that record, found: Code:
.... Dug some more, found they injected some stuff off this issue: http://www.vbulletin.com/forum/forum...-1-vbulletin-5 And this is indeed the remnants of the known compromised site. I.e. subscriptions.php leads to that C99madShell v. 2.0 madnet edition file/exploit. So: why the blank emails every 20 minutes? I setup a test in check4hack.php changing it from: Code:
vbmail($recipent,$vbphrase['c4h_subject'],construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); Code:
vbmail($recipent,$vbphrase['c4h_subject'],construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); This explains why it 'works' for most people. One turns on 'demo', runs the cron by hand, you get the email, you turn off 'demo', and never get a 'broken' email. Can anyone smarter than me tell me why those wouldn't be set during automatic cron vs. 'run now' cron? That'd be the key to fixing it! :D |
Heya,
Thought I'd post the code of check4hack.php written by the OP. It is really short, and maybe someone browsing this can say, "oh, well that needs to be set when called by cron automatically vs. run 'by hand'" or something? Code:
<?php |
And here is an example of the Scheduled Task Log when running it 'by hand':
Code:
10311 Check 4 Hacking 10:12, 20th Sep 2013 Infects found: pluginlist Code:
10315 Check 4 Hacking 10:14, 20th Sep 2013 Infects found: pluginlist |
All times are GMT. The time now is 05:08 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|