- This topic has 2 replies, 2 voices, and was last updated 14 years, 7 months ago by imported_Ryan.
-
AuthorPosts
-
April 27, 2010 at 1:33 am #1414pakijonMember
Hello I wanted to try out your drop down menu component in my WP site but my WP security scanner is giving me a warning sign about your codes. Please clarify. Thank you.
Here is the report:
[b:981ogsh8]Exploit
[/b:981ogsh8]
File/Dataset Description
/wp-content/plugins/pixopoint-menu/scripts/superfish.js:11
Could be JavaScript code used to hide code inserted by a hacker.
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?”:e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!”.replace(/^/,String)){while(c–)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return&#/wp-content/plugins/pixopoint-menu/scripts/superfish.js:11
JavaScript code used to hide suspicious code, but can also be legitimate code.
on(c){return(c<a?”:e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!”.replace(/^/,String)){while(c–)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return’\w+’};c=1};while(c–)if(k/wp-content/plugins/pixopoint-menu/scripts/jquery.simpletip-1.3.1.pack.js:14
Could be JavaScript code used to hide code inserted by a hacker.
eval(function(p,a,c,k,e,r){e=function(c){return(c<62?”:e(parseInt(c/62)))+((c=c%62)>35?String.fromCharCode(c+29):c.toString(36))};if(‘0′.replace(0,e)==0){while(c–)r[e(c)]=k[c];k=[function(e){return r[e]||e}];e=function(){return’/wp-content/plugins/pixopoint-menu/scripts/jquery.simpletip-1.3.1.pack.js:14
JavaScript code used to hide suspicious code, but can also be legitimate code.
c){return(c<62?”:e(parseInt(c/62)))+((c=c%62)>35?String.fromCharCode(c+29):c.toString(36))};if(‘0′.replace(0,e)==0){while(c–)r[e(c)]=k[c];k=[function(e){return r[e]||e}];e=function(){return'([3-9a-zB-Z]|1\w)’};c=1};while(cApril 27, 2010 at 4:40 am #8475imported_RyanMemberNone of that code is from the PixoPoint Menu plugin.
It looks like you have been hacked. I don’t think this is likely to be caused by the plugin, but I’m very keen to have a look at the files if you could send them to the address on this page … https://geek.hellyer.kiwi/contact/
The warnings should go away if you just re-upload the plugin as it should over-write all those problems.
The latest beta version of the PixoPoint Menu plugin has some extra security stuff in place which would theoretically prevent code like that from being outputted via the plugin … https://geek.hellyer.kiwi/pixopoint-menu-plugin-beta-0-8/
April 27, 2010 at 4:49 am #8476imported_RyanMemberActually, that’s the .js files which have been hacked. I assumed initially it was the .js.php files which were outputting code direct from the options table.
Are any of your other files displaying warnings? Or just the PixoPoint Menu plugin ones?
My best guess right now is that your site has been hacked, and all of your .js files have had nasty code injected into them. But I can’t tell from here unfortunately.
-
AuthorPosts
- You must be logged in to reply to this topic.