<?php /** @noinspection PhpComposerExtensionStubsInspection */
use security\wordpress\vulnerabilities\Rsssl_File_Storage;
defined('ABSPATH') or die();
//including the file storage class
require_once(rsssl_path . 'security/wordpress/vulnerabilities/class-rsssl-file-storage.php');
/**
* @package Really Simple Security
* @subpackage RSSSL_VULNERABILITIES
*/
if (!class_exists("rsssl_vulnerabilities")) {
/**
*
* Class rsssl_vulnerabilities
* Checks for vulnerabilities in the core, plugins and themes.
*
* @property $notices
* @author Marcel Santing
* this class handles import of vulnerabilities, notifying and informing the user.
*
*/
class rsssl_vulnerabilities
{
const RSSSL_SECURITY_API = 'https://downloads.really-simple-security.com/rsssl/vulnerabilities/V1/';
public $workable_plugins = [];
/**
* interval to download new jsons
*/
public $interval = 12 * HOUR_IN_SECONDS;
public $update_count = 0;
protected $risk_naming = [];
/**
* @var array|int[]
*/
public $risk_levels = [
'l' => 1,
'm' => 2,
'h' => 3,
'c' => 4,
];
public $jsons_files_updated = false;
public function __construct()
{
$this->init();
$this->load_translations_just_in_time();
add_filter('rsssl_vulnerability_data', array($this, 'get_stats'));
//now we add the action to the cron.
add_action('rsssl_three_hours_cron', array($this, 'run_cron'));
add_filter('rsssl_notices', [$this, 'show_help_notices'], 10, 1);
add_action( 'rsssl_after_save_field', array( $this, 'maybe_delete_local_files' ), 10, 4 );
add_action( 'rsssl_upgrade', array( $this, 'upgrade_encrypted_files') );
}
/**
* As this class is not only instantiated by requiring this file
* but also in other class instances, we are not 100% sure of the
* current filter or action. So we check if we are in the init action
* or if the init action has already been executed. If so, we load the
* translations immediately and just in time.
*/
public function load_translations_just_in_time(): void
{
add_action('init', [$this, 'load_translations']);
if (current_filter() === 'init' || did_action('init') > 0) {
$this->load_translations();
}
}
/**
* Load the translations for the risk levels
*/
public function load_translations(): void
{
$this->risk_naming = [
'l' => __('low-risk', 'really-simple-ssl'),
'm' => __('medium-risk', 'really-simple-ssl'),
'h' => __('high-risk', 'really-simple-ssl'),
'c' => __('critical', 'really-simple-ssl'),
];
}
/**
* Upgrade to the new encryption system by deleting all files en re-downloading
*
* @return void
*/
public function upgrade_encrypted_files($prev_version) : void {
if ( $prev_version && version_compare( $prev_version, '8.3.0', '<' ) ) {
//delete all files and reload
Rsssl_File_Storage::DeleteAll();
$this->force_reload_files();
delete_option( 'rsssl_hashkey' );
}
}
// /**
// * @param $field_id
// * @param $field_value
// * @param $prev_value
// * @param $field_type
// *
// * @return void
// *
// *
// */
// public function maybe_enable_vulnerability_scanner( $field_id, $field_value, $prev_value, $field_type ) {
// if ( $field_id==='enable_vulnerability_scanner' && $field_value !== $prev_value && rsssl_user_can_manage() ) {
// if ( $field_value !== false ) {
// // Already enabled
// rsssl_update_option('enable_vulnerability_scanner', 1);
// }
// }
// }
/**
* Deletes local files if the vulnerability scanner is disabled
*
* @param $field_id
* @param $field_value
* @param $prev_value
* @param $field_type
*
* @return void
*/
public static function maybe_delete_local_files($field_id, $field_value, $prev_value, $field_type): void {
if ( $field_id==='enable_vulnerability_scanner' && $field_value !== $prev_value && rsssl_user_can_manage() ) {
if ( $field_value == false ) {
// Already disabled
require_once(rsssl_path . 'security/wordpress/vulnerabilities/class-rsssl-file-storage.php');
\security\wordpress\vulnerabilities\Rsssl_File_Storage::DeleteAll();
}
}
}
public function riskNaming($risk = null)
{
if (is_null($risk)) {
return $this->risk_naming;
}
return $this->risk_naming[$risk];
}
/* Public Section 1: Class Build-up initialization and instancing */
public function run_cron(): void {
$this->check_files();
$this->cache_installed_plugins(true);
if ( $this->jsons_files_updated ) {
if ($this->should_send_mail()) {
$this->send_vulnerability_mail();
}
$this->check_notice_reset();
}
}
/**
* Check if dismissed notices have to be reset
* @return void
*/
private function check_notice_reset(): void {
$this->cache_installed_plugins();
$clear_admin_notices_cache = false;
foreach ( $this->risk_levels as $level => $int_level ) {
if ( $this->should_reset_notification($level) ) {
delete_option("rsssl_" . 'risk_level_' . $level . "_dismissed");
$clear_admin_notices_cache = true;
}
}
if ( $clear_admin_notices_cache ) {
RSSSL()->admin->clear_admin_notices_cache();
}
}
/**
* Allow users to manually force a re-check, e.g. in case of manually updating plugins
* @return void
*/
public function force_reload_files(): void {
if ( ! rsssl_admin_logged_in() ) {
return;
}
\security\wordpress\vulnerabilities\Rsssl_File_Storage::DeleteOldFiles();
if ( isset($_GET['rsssl_check_vulnerabilities']) || get_option('rsssl_reload_vulnerability_files') ) {
delete_option('rsssl_reload_vulnerability_files');
$this->reload_files_on_update();
update_option('rsssl_clear_vulnerability_notices', true, false);
set_transient('rsssl_delay_clear', true, 1 * MINUTE_IN_SECONDS );
}
if ( get_option('rsssl_clear_vulnerability_notices') && !get_transient('rsssl_delay_clear')) {
RSSSL()->admin->clear_admin_notices_cache();
delete_option('rsssl_clear_vulnerability_notices');
}
}
/**
* Checks the files on age and downloads if needed.
* @return void
*/
public function reload_files_on_update(): void {
if ( ! rsssl_admin_logged_in() ) {
return;
}
//if the manifest is not older than 4 hours, we don't download it again.
if ( $this->get_file_stored_info(false, true) < time() - 14400) {
$this->download_manifest();
}
$this->download_plugin_vulnerabilities();
$this->download_core_vulnerabilities();
$this->check_notice_reset();
}
public function init(): void {
if ( ! rsssl_admin_logged_in() ) {
return;
}
//we check the rsssl options if the enable_feedback_in_plugin is set to true
if ( rsssl_get_option('enable_feedback_in_plugin') ) {
// we enable the feedback in the plugin
$this->enable_feedback_in_plugin();
$this->enable_feedback_in_theme();
}
//we check if upgrader_process_complete is called, so we can reload the files.
add_action('upgrader_process_complete', array($this, 'reload_files_on_update'), 10, 2);
add_action('_core_updated_successfully', array($this, 'prepare_reloading_of_files'), 10, 2);
//After activation, we need to reload the files.
add_action( 'activate_plugin', array($this, 'reload_files_on_update'), 10, 2);
//we can also force it
add_action( 'admin_init', array($this, 'force_reload_files'));
//same goes for themes.
add_action('after_switch_theme', array($this, 'reload_files_on_update'), 10, 2);
add_action('current_screen', array($this, 'show_inline_code'));
}
/**
* Directly hooking into the core upgrader hook doesn't work, so is too early.
* To force this, we save an option we can check later
*
* @return void
*/
public function prepare_reloading_of_files(): void {
update_option("rsssl_reload_vulnerability_files", true, false);
}
/**
* Function used for first run of the plugin.
*
* @return array
*/
public static function firstRun(): array
{
if ( ! rsssl_user_can_manage() ) {
return [];
}
$self = new self();
$self->check_files();
$self->cache_installed_plugins(true);
return [
'request_success' => true,
'data' => $self->workable_plugins
];
}
/**
* Get site health notice for vulnerabilities
* @return array
*/
public function get_site_health_notice(): array {
if (!rsssl_admin_logged_in()){
return [];
}
$this->cache_installed_plugins();
$risks = $this->count_risk_levels();
if (count($risks) === 0) {
return array(
'label' => __( 'No known vulnerabilities detected', 'really-simple-ssl' ),
'status' => 'good',
'badge' => array(
'label' => __('Security'),
'color' => 'blue',
),
'description' => sprintf(
'<p>%s</p>',
__( 'No known vulnerabilities detected', 'really-simple-ssl' )
),
'actions' => '',
'test' => 'health_test',
);
}
$total = 0;
foreach ($this->risk_levels as $risk_level => $value) {
$total += $risks[ $risk_level ] ?? 0;
}
return array(
'label' => __( 'Vulnerabilities detected','really-simple-ssl' ),
'status' => 'critical',
'badge' => array(
'label' => __( 'Security' ),
'color' => 'blue',
),
'description' => sprintf(
'<p>%s</p>',
sprintf(_n( '%s vulnerability has been detected.', '%s vulnerabilities have been detected.', $total, 'really-simple-ssl' ), number_format_i18n( $total )) . ' '.
__( 'Please check the vulnerabilities overview for more information and take appropriate action.' ,'really-simple-ssl' )
),
'actions' => sprintf(
'<p><a href="%s" target="_blank" rel="noopener noreferrer">%s</a></p>',
esc_url( rsssl_admin_url([], '#settings/vulnerabilities/vulnerabilities-overview') ),
__( 'View vulnerabilities', 'really-simple-ssl' )
),
'test' => 'rsssl_vulnerabilities',
);
}
public function show_help_notices($notices)
{
$this->cache_installed_plugins();
$risks = $this->count_risk_levels();
$level_to_show_on_dashboard = rsssl_get_option('vulnerability_notification_dashboard');
$level_to_show_sitewide = rsssl_get_option('vulnerability_notification_sitewide');
foreach ($this->risk_levels as $risk_level => $value) {
if ( !isset($risks[$risk_level]) ) {
continue;
}
//this is shown bases on the config of vulnerability_notification_dashboard
$siteWide = false;
$dashboardNotice = false;
if ( $level_to_show_on_dashboard && $level_to_show_on_dashboard !== '*') {
if ($value >= $this->risk_levels[$level_to_show_on_dashboard]) {
$dashboardNotice = true;
}
}
if ($level_to_show_sitewide && $level_to_show_sitewide !== '*') {
if ($value >= $this->risk_levels[$level_to_show_sitewide]) {
$siteWide = true;
}
}
if ( !$dashboardNotice && !$siteWide ) {
continue;
}
$count = $risks[$risk_level];
$title = $this->get_warning_string($risk_level, $count);
$notice = [
'callback' => '_true_',
'score' => 1,
'show_with_options' => ['enable_vulnerability_scanner'],
'output' => [
'true' => [
'title' => $title,
'msg' => $title.' '.__('Please take appropriate action.','really-simple-ssl'),
'icon' => ($risk_level === 'c' || $risk_level==='h') ? 'warning' : 'open',
'type' => 'warning',
'dismissible' => true,
'admin_notice' => $siteWide,
'plusone' => true,
'highlight_field_id' => 'vulnerabilities-overview',
]
],
];
$notices['risk_level_' . $risk_level] = $notice;
}
//now we add the test notices for admin and dahboard.
//if the option is filled, we add the test notice.
$test_id = get_option('test_vulnerability_tester');
if($test_id) {
$dashboard = rsssl_get_option('vulnerability_notification_dashboard');
$side_wide = rsssl_get_option('vulnerability_notification_sitewide');
$site_wide_icon = $side_wide === 'l' || $side_wide === 'm' ? 'open' : 'warning';
if ( $side_wide === 'l' || $side_wide === 'm' || $side_wide === 'h' || $side_wide === 'c') {
$notices[ 'test_vulnerability_sitewide_' .$test_id ] = [
'callback' => '_true_',
'score' => 1,
'show_with_options' => [ 'enable_vulnerability_scanner' ],
'output' => [
'true' => [
'title' => __( 'Site wide - Test Notification', 'really-simple-ssl' ),
'msg' => __( 'This is a test notification from Really Simple Security. You can safely dismiss this message.', 'really-simple-ssl' ),
'url' => rsssl_admin_url([], '#settings/vulnerabilities/vulnerabilities-overview'),
'icon' => $site_wide_icon,
'dismissible' => true,
'admin_notice' => true,
'plusone' => true,
]
]
];
}
//don't add this one if the same level
$dashboard_icon = $dashboard === 'l' || $dashboard === 'm' ? 'open' : 'warning';
if ($dashboard_icon !== $site_wide_icon) {
if ( $dashboard === 'l' || $dashboard === 'm' || $dashboard === 'h' || $dashboard === 'c' ) {
$notices[ 'test_vulnerability_dashboard_' .$test_id ] = [
'callback' => '_true_',
'score' => 1,
'show_with_options' => [ 'enable_vulnerability_scanner' ],
'output' => [
'true' => [
'title' => __( 'Dashboard - Test Notification', 'really-simple-ssl' ),
'msg' => __( 'This is a test notification from Really Simple Security. You can safely dismiss this message.', 'really-simple-ssl' ),
'icon' => $dashboard_icon,
'dismissible' => true,
'admin_notice' => false,
'plusone' => true,
]
]
];
}
}
}
return $notices;
}
/**
* Generate plugin files for testing purposes.
*
* @return array
*/
public static function testGenerator(): array
{
$mail_notification = rsssl_get_option('vulnerability_notification_email_admin');
if ( $mail_notification === 'l' || $mail_notification === 'm' || $mail_notification === 'h' || $mail_notification === 'c' ) {
$mailer = new rsssl_mailer();
$mailer->send_test_mail();
}
return [];
}
/* Public Section 2: DataGathering */
/**
* @param $stats
*
* @return array
*/
public function get_stats($stats): array
{
if ( ! rsssl_user_can_manage() ) {
return $stats;
}
$this->cache_installed_plugins();
//now we only get the data we need.
$vulnerabilities = array_filter($this->workable_plugins, static function ($plugin) {
if (isset($plugin['vulnerable']) && $plugin['vulnerable']) {
return $plugin;
}
return false;
});
$time = $this->get_file_stored_info(true);
$stats['vulnerabilities'] = count($vulnerabilities);
$stats['vulList'] = $vulnerabilities;
$riskData = $this->measures_data();
$stats['riskData'] = $riskData['data'];
$stats['lastChecked'] = $time;
return $stats;
}
/**
* This combines the vulnerabilities with the installed plugins
*
* And loads it into a memory cache on page load
*
*/
public function cache_installed_plugins($force_update=false): void
{
if ( ! rsssl_admin_logged_in() ) {
return;
}
if ( !$force_update && !empty($this->workable_plugins) ) {
return;
}
//first we get all installed plugins
$installed_plugins = get_plugins();
$installed_themes = wp_get_themes();
//we flatten the array
$update = get_site_transient('update_themes');
//we make the installed_themes look like the installed_plugins
$installed_themes = array_map( static function ($theme) use ($update) {
return [
'Name' => $theme->get('Name'),
'Slug' => $theme->get('TextDomain'),
'description' => $theme->get('Description'),
'Version' => $theme->get('Version'),
'Author' => $theme->get('Author'),
'AuthorURI' => $theme->get('AuthorURI'),
'PluginURI' => $theme->get('ThemeURI'),
'TextDomain' => $theme->get('TextDomain'),
'RequiresWP' => $theme->get('RequiresWP'),
'RequiresPHP' => $theme->get('RequiresPHP'),
'update_available' => isset($update->response[$theme->get('TextDomain')]),
];
}, $installed_themes);
//we add a column type to all values in the array
$installed_themes = array_map( static function ($theme) {
$theme['type'] = 'theme';
return $theme;
}, $installed_themes);
//we add a column type to all values in the array
//this resets the array keys (currently slugs) so we preserve them in the 'Slug' column.
$update = get_site_transient('update_plugins');
$installed_plugins = array_map( static function ($plugin, $slug) use ($update) {
$plugin['type'] = 'plugin';
$plugin['update_available'] = isset($update->response[$slug]);
$plugin['Slug'] = dirname($slug);
$plugin['File'] = $slug;
return $plugin;
}, $installed_plugins, array_keys($installed_plugins) );
//we merge the two arrays
$installed_plugins = array_merge($installed_plugins, $installed_themes);
//now we get the components from the file
$components = $this->get_components();
//We loop through plugins and check if they are in the components array
foreach ($installed_plugins as $plugin) {
$slug = $plugin['Slug'];
$plugin['vulnerable'] = false;
if( $plugin['type'] === 'theme' ) {
// we check if the theme exists as a directory
$plugin['folder_exists'] = file_exists(get_theme_root() . '/' . $slug );
}
if( $plugin['type'] === 'plugin' ) {
//also we check if the folder exists for the plugin we added this check for later purposes
$plugin['folder_exists'] = file_exists(WP_PLUGIN_DIR . '/' . dirname($slug) );
}
//if there are no components, we return
if ( !empty($components) ) {
foreach ($components as $component) {
if ($plugin['Slug'] === $component->slug) {
if (!empty($component->vulnerabilities) && $plugin['folder_exists'] === true) {
$plugin['vulnerable'] = true;
$plugin['risk_level'] = $this->get_highest_vulnerability($component->vulnerabilities);
$plugin['rss_identifier'] = $this->getLinkedUUID($component->vulnerabilities, $plugin['risk_level']);
$plugin['risk_name'] = $this->risk_naming[$plugin['risk_level']];
$plugin['date'] = $this->getLinkedDate($component->vulnerabilities, $plugin['risk_level']);
}
}
}
}
//we walk through the components array
$this->workable_plugins[$slug] = $plugin;
}
//now we get the core information
$core = $this->get_core();
//we create a plugin like entry for core to add to the workable_plugins array
$core_plugin = [
'Name' => 'WordPress',
'Slug' => 'wordpress',
'Version' => $core->version?? '',
'Author' => 'WordPress',
'AuthorURI' => 'https://wordpress.org/',
'PluginURI' => 'https://wordpress.org/',
'TextDomain' => 'wordpress',
'type' => 'core',
];
$core_plugin['vulnerable'] = false;
//we check if there is an update available
$update = get_site_transient('update_core');
if (isset($update->updates[0]->response) && $update->updates[0]->response === 'upgrade') {
$core_plugin['update_available'] = true;
} else {
$core_plugin['update_available'] = false;
}
//if there are no components, we return
if ( !empty($core->vulnerabilities) ) {
$core_plugin['vulnerable'] = true;
$core_plugin['risk_level'] = $this->get_highest_vulnerability($core->vulnerabilities);
$core_plugin['rss_identifier'] = $this->getLinkedUUID($core->vulnerabilities, $core_plugin['risk_level']);
$core_plugin['risk_name'] = $this->risk_naming[$core_plugin['risk_level']];
$core_plugin['date'] = $this->getLinkedDate($core->vulnerabilities, $core_plugin['risk_level']);
}
//we add the core plugin to the workable_plugins array
$this->workable_plugins['wordpress'] = $core_plugin;
}
/* Public Section 3: The plugin page add-on */
/**
* Callback for the manage_plugins_columns hook to add the vulnerability column
*
* @param $columns
*/
public function add_vulnerability_column($columns)
{
$columns['vulnerability'] = __('Vulnerabilities', 'really-simple-ssl');
return $columns;
}
/**
* Get the data for the risk vulnerabilities table
* @param $data
* @return array
*/
public function measures_data(): array
{
$measures = [];
$measures[] = [
'id' => 'force_update',
'name' => __('Force update', 'really-simple-ssl'),
'value' => get_option('rsssl_force_update'),
'description' => sprintf(__('Will run a frequent update process on vulnerable components.', 'really-simple-ssl'), $this->riskNaming('l')),
];
$measures[] = [
'id' => 'quarantine',
'name' => __('Quarantine', 'really-simple-ssl'),
'value' => get_option('rsssl_quarantine'),
'description' => sprintf(__('Components will be quarantined if the update process fails.', 'really-simple-ssl'), $this->riskNaming('m')),
];
return [
"request_success" => true,
'data' => $measures
];
}
/**
* Store the mesures from the api
* @param $measures
*
* @return array
*/
public function measures_set($measures): array {
if (!rsssl_user_can_manage()) {
return [];
}
$risk_data = $measures['riskData'] ?? [];
foreach ( $risk_data as $risk ) {
if ( !isset($risk['value']) ) {
continue;
}
update_option('rsssl_'.sanitize_title($risk['id']), $this->sanitize_measure($risk['value']), false );
}
return [];
}
/**
* Sanitize a measure
*
* @param string $measure
*
* @return mixed|string
*/
public function sanitize_measure($measure) {
return isset($this->risk_levels[$measure]) ? $measure : '*';
}
/**
* Callback for the manage_plugins_custom_column hook to add the vulnerability field
*
* @param string $column_name
* @param string $plugin_file
*/
public function add_vulnerability_field( string $column_name, string $plugin_file): void {
if ( ( $column_name === 'vulnerability' ) ) {
$this->cache_installed_plugins();
if ($this->check_vulnerability( $plugin_file ) ) {
switch ( $this->check_severity( $plugin_file ) ) {
case 'c':
printf(
'<a class="rsssl-btn-vulnerable rsssl-critical" target="_blank" rel="noopener noreferrer" href="%s">%s</a>',
rsssl_link('vulnerability/' . $this->getIdentifier( $plugin_file ) ),
ucfirst( $this->risk_naming['c'] )
);
break;
case 'h':
printf(
'<a class="rsssl-btn-vulnerable rsssl-high" target="_blank" rel="noopener noreferrer" href="%s">%s</a>',
rsssl_link('vulnerability/' . $this->getIdentifier( $plugin_file ) ),
ucfirst( $this->risk_naming['h'] )
);
break;
case 'm':
printf(
'<a class="rsssl-btn-vulnerable rsssl-medium" target="_blank" rel="noopener noreferrer" href="%s">%s</a>',
rsssl_link('vulnerability/' . $this->getIdentifier( $plugin_file ) ),
ucfirst( $this->risk_naming['m'] )
);
break;
default:
echo sprintf(
'<a class="rsssl-btn-vulnerable rsssl-low" target="_blank" rel="noopener noreferrer" href="%s">%s</a>',
rsssl_link('vulnerability/' . $this->getIdentifier( $plugin_file ) ),
ucfirst( $this->risk_naming['l'] )
);
break;
}
}
if ( $this->is_quarantined($plugin_file)) {
echo sprintf( '<a class="rsssl-btn-vulnerable rsssl-critical" target="_blank" rel="noopener noreferrer" href="%s">%s</a>',
'https://really-simple-ssl.com/instructions/about-vulnerabilities/#quarantine' , __("Quarantined","really-simple-ssl") );
}
}
}
/**
* Callback for the admin_enqueue_scripts hook to add the vulnerability styles
*
* @param $hook
*
* @return void
*/
public function add_vulnerability_styles($hook)
{
if ('plugins.php' !== $hook) {
return;
}
//only on settings page
$rtl = is_rtl() ? 'rtl/' : '';
$url = trailingslashit(rsssl_url) . "assets/css/{$rtl}rsssl-plugin.min.css";
$path = trailingslashit(rsssl_path) . "assets/css/{$rtl}rsssl-plugin.min.css";
if (file_exists($path)) {
wp_enqueue_style('rsssl-plugin', $url, array(), rsssl_version);
}
}
/**
* checks if the plugin is vulnerable
*
* @param $plugin_file
*
* @return mixed
*/
private function check_vulnerability($plugin_file)
{
return $this->workable_plugins[ dirname($plugin_file) ]['vulnerable'] ?? false;
}
/**
* Check if a plugin is quarantined
*
* @param string $plugin_file
*
* @return bool
*/
private function is_quarantined(string $plugin_file): bool {
return strpos($plugin_file, '-rsssl-q-')!==false;
}
/**
* checks if the plugin's severity closed
*
* @param $plugin_file
*
* @return mixed
*/
private function check_severity($plugin_file)
{
return $this->workable_plugins[dirname($plugin_file)]['risk_level'];
}
private function getIdentifier($plugin_file)
{
return $this->workable_plugins[dirname($plugin_file)]['rss_identifier'];
}
/* End of plug-in page add-on */
/* Public and private functions | Files and storage */
/**
* Checks the files on age and downloads if needed.
*
* @return void
*/
public function check_files(): void
{
if ( ! rsssl_admin_logged_in() ) {
return;
}
//we download the manifest file if it doesn't exist or is older than 12 hours
if ($this->validate_local_file(false, true)) {
if ( $this->get_file_stored_info(false, true) < time() - $this->interval ) {
$this->download_manifest();
}
} else {
$this->download_manifest();
}
//We check the core vulnerabilities and validate age and existence
if ($this->validate_local_file(true, false)) {
//if the file is younger than 12 hours, we don't download it again.
if ($this->get_file_stored_info(true) < time() - $this->interval ) {
$this->download_core_vulnerabilities();
}
} else {
$this->download_core_vulnerabilities();
}
//We check the plugin vulnerabilities and validate age and existence
if ($this->validate_local_file()) {
if ($this->get_file_stored_info() < time() - $this->interval ) {
$this->download_plugin_vulnerabilities();
}
} else {
$this->download_plugin_vulnerabilities();
}
}
/**
* Checks if the file is valid and exists. It checks three files: the manifest, the core vulnerabilities and the plugin vulnerabilities.
*
* @param bool $isCore
* @param bool $manifest
*
* @return bool
*/
private function validate_local_file(bool $isCore = false, bool $manifest = false): bool
{
if ( ! rsssl_admin_logged_in() ) {
return false;
}
if (!$manifest) {
//if we don't check for the manifest, we check the other files.
$isCore ? $file = 'core.json' : $file = 'components.json';
} else {
$file = 'manifest.json';
}
$upload_dir = Rsssl_File_Storage::get_upload_dir();
$file = $upload_dir . '/' . $file;
if (file_exists($file)) {
//now we check if the file is older than 3 days, if so, we download it again
$file_time = filemtime($file);
$now = time();
$diff = $now - $file_time;
$days = floor($diff / (60 * 60 * 24));
if ($days < 1) {
return true;
}
}
return false;
}
/**
* Downloads bases on given url
*
* @param string $url
*
* @return mixed|null
* @noinspection PhpComposerExtensionStubsInspection
*/
private function download(string $url)
{
if ( ! rsssl_admin_logged_in() ) {
return null;
}
//now we check if the file remotely exists and then log an error if it does not.
$response = wp_remote_get( $url );
if ( is_wp_error( $response ) ) {
return null;
}
if ( wp_remote_retrieve_response_code($response) !== 200 ) {
return null;
}
$json = wp_remote_retrieve_body($response);
return json_decode($json);
}
private function remote_file_exists($url): bool {
try {
$headers = @get_headers($url);
if ($headers === false) {
// URL is not accessible or some error occurred
return false;
}
// Check if the HTTP status code starts with "200" (indicating success)
return strpos($headers[0], '200') !== false;
// Rest of your code handling $headers goes here
} catch (Exception $e) {
return false;
}
}
/**
* Stores a full core or component file in the upload folder
*
* @param $data
* @param bool $isCore
* @param bool $manifest
*
* @return void
*/
private function store_file($data, bool $isCore = false, bool $manifest = false): void
{
if ( ! rsssl_admin_logged_in() ) {
return;
}
//we get the upload directory
$upload_dir = Rsssl_File_Storage::get_upload_dir();
if ( !$manifest ) {
$file = $upload_dir . '/' . ($isCore ? 'core.json' : 'components.json');
} else {
$file = $upload_dir . '/manifest.json';
}
//we delete the old file if it exists
if ( file_exists($file) ) {
wp_delete_file($file);
}
//if the data is empty, we return null
if ( empty($data) ) {
return;
}
Rsssl_File_Storage::StoreFile($file, $data);
$this->jsons_files_updated = true;
}
public function get_file_stored_info($isCore = false, $manifest = false)
{
if ( ! rsssl_admin_logged_in() ) {
return false;
}
$upload_dir = Rsssl_File_Storage::get_upload_dir();
if ($manifest) {
$file = $upload_dir . '/manifest.json';
if (!file_exists($file)) {
return false;
}
return Rsssl_File_Storage::GetDate($file);
}
$file = $upload_dir . '/' . ($isCore ? 'core.json' : 'components.json');
if (!file_exists($file)) {
return false;
}
return Rsssl_File_Storage::GetDate($file);
}
/* End of files and Storage */
/* Section for the core files Note: No manifest is needed */
/**
* Downloads the vulnerabilities for the current core version.
*
* @return void
*/
protected function download_core_vulnerabilities(): void
{
if ( ! rsssl_admin_logged_in() ) {
return;
}
global $wp_version;
$url = self::RSSSL_SECURITY_API . 'core/WordPress.json';
$data = $this->download($url);
if (!$data) {
return;
}
$data->vulnerabilities = $this->filter_vulnerabilities($data->vulnerabilities, $wp_version, true);
//first we store this as a json file in the uploads folder
$this->store_file($data, true);
}
/* End of core files section */
/* Section for the plug-in files */
/**
* Downloads the vulnerabilities for the current plugins.
*
* @return void
*/
protected function download_plugin_vulnerabilities(): void
{
if ( ! rsssl_admin_logged_in() ) {
return;
}
//we get all the installed plugins
$installed_plugins = get_plugins();
//first we get the manifest file
$manifest = $this->getManifest();
$vulnerabilities = [];
foreach ($installed_plugins as $file => $plugin) {
$slug = dirname($file);
$installed_plugins[ $file ]['Slug'] = $slug;
$url = self::RSSSL_SECURITY_API . 'plugin/' . $slug . '.json';
//if the plugin is not in the manifest, we skip it
if (!in_array($slug, (array)$manifest)) {
continue;
}
$data = $this->download($url);
if ($data !== null) {
$vulnerabilities[] = $data;
}
}
//we also do it for all the installed themes
$installed_themes = wp_get_themes();
foreach ($installed_themes as $theme) {
$theme = $theme->get('TextDomain');
$url = self::RSSSL_SECURITY_API . 'theme/' . $theme . '.json';
//if the plugin is not in the manifest, we skip it
if (!in_array($theme, (array)$manifest)) {
continue;
}
$data = $this->download($url);
if ($data !== null) {
$vulnerabilities[] = $data;
}
}
//we make the installed_themes look like the installed_plugins
$installed_themes = array_map( static function ($theme) {
return [
'Name' => $theme->get('Name'),
'Slug' => $theme->get('TextDomain'),
'description' => $theme->get('Description'),
'Version' => $theme->get('Version'),
'Author' => $theme->get('Author'),
'AuthorURI' => $theme->get('AuthorURI'),
'PluginURI' => $theme->get('ThemeURI'),
'TextDomain' => $theme->get('TextDomain'),
'RequiresWP' => $theme->get('RequiresWP'),
'RequiresPHP' => $theme->get('RequiresPHP'),
];
}, $installed_themes);
//we merge $installed_plugins and $installed_themes
$installed_plugins = array_merge($installed_plugins, $installed_themes);
//we filter the vulnerabilities
$vulnerabilities = $this->filter_active_components($vulnerabilities, $installed_plugins);
$this->store_file($vulnerabilities);
}
/**
* Loads the info from the files Note this is also being used for the themes.
*
* @return mixed|null
*/
private function get_components()
{
if ( ! rsssl_admin_logged_in() ) {
return [];
}
$upload_dir = Rsssl_File_Storage::get_upload_dir();
$file = $upload_dir . '/components.json';
if (!file_exists($file)) {
return [];
}
$components = Rsssl_File_Storage::GetFile($file);
if (!is_array($components)) $components = [];
return $components;
}
/* End of plug-in files section */
/* Section for the core files Note: No manifest is needed */
private function get_core()
{
if ( ! rsssl_admin_logged_in() ) {
return null;
}
$upload_dir = Rsssl_File_Storage::get_upload_dir();
$file = $upload_dir . '/core.json';
if (!file_exists($file)) {
return false;
}
return Rsssl_File_Storage::GetFile($file);
}
/* Section for the theme files */
public function enable_feedback_in_theme(): void {
//Logic here for theme warning Create Callback and functions for these steps
//we only display the warning for the theme page
add_action('current_screen', [$this, 'show_theme_warning']);
}
public function show_theme_warning($hook)
{
$screen = get_current_screen();
if ($screen && $screen->id !== 'themes') {
return;
}
//we add warning scripts to themes
add_action('admin_enqueue_scripts', [$this, 'enqueue_theme_warning_scripts']);
}
public function show_inline_code($hook): void {
if ($hook !== 'themes.php') {
return;
}
//we add warning scripts to themes
add_action('admin_footer', [$this, 'enqueue_theme_warning_scripts']);
}
public function enqueue_theme_warning_scripts(): void {
//we get all components with vulnerabilities
$components = $this->get_components();
ob_start();?>
<script>
window.addEventListener("load", () => {
let style = document.createElement('style');
let vulnerable_components = [<?php echo implode(',', array_map(function ($component) {
return "{slug: '" . esc_attr($component->slug) . "', risk: '" . esc_attr($this->get_highest_vulnerability($component->vulnerabilities)) . "'}";
}, $components)) ?>];
//we create the style for warning
style.innerHTML = '.rsssl-theme-notice {box-shadow: 0 1px 1px 0 rgba(0,0,0,.1); position:relative; z-index:50; margin-bottom: -35px; padding: 8px 12px;}';
style.innerHTML += '.rsssl-theme-notice-warning {background-color: #FFF6CE; border-left: 4px solid #ffb900;}';
//we create the style for danger
style.innerHTML += '.rsssl-theme-notice-danger {background-color: #FFCECE; border-left: 4px solid #dc3232;}';
style.innerHTML += '.rsssl-theme-notice-below-notice{margin-top: 41px;}';
style.innerHTML += '.rsssl-theme-notice-warning .dashicons, .rsssl-theme-notice-danger .dashicons{margin-right: 12px;}';
let levels = <?php echo json_encode($this->risk_naming)?>;
//we add the style to the head
document.head.appendChild(style);
//we loop through the components
vulnerable_components.forEach(function(component) {
//we get the theme element
let theme_element = document.querySelector(".theme[data-slug='"+component.slug+"']");
//if the theme exists
if (theme_element) {
//check if theme element contains notice. if so, push this notice down with class rsssl-theme-notice-below-notice
let hasNotice = theme_element.querySelector('.update-message.notice');
//we check the risk
let level = levels[component.risk];
let text = '<?php echo esc_attr(__('Vulnerability: %s', 'really-simple-ssl')) ?>';
text = text.replace('%s', level);
let divClass = ' rsssl-theme-notice ';
divClass += component.risk === 'h' || component.risk === 'c' ? 'rsssl-theme-notice-danger' : 'rsssl-theme-notice-warning';
if (hasNotice) divClass += ' rsssl-theme-notice-below-notice';
theme_element.insertAdjacentHTML('afterbegin', `
<div class="${divClass}">
<div><span class="dashicons dashicons-info"></span>${text}</div>
</div>
`);
}
});
//find quarantined themes, find all themes where the data-slug contains '-rsssl-q'
document.querySelectorAll(".theme[data-slug*='-rsssl-q']").forEach(function(theme_element) {
//if the theme exists
if ( theme_element ) {
//we check the risk
let text = '<?php echo esc_attr(__('Quarantined', 'really-simple-ssl')) ?>';
let divClass = 'rsssl-theme-notice rsssl-theme-notice-danger';
theme_element.insertAdjacentHTML('afterbegin', `
<div class="${divClass}">
<div><span class="dashicons dashicons-info"></span>
<a href="https://really-simple-ssl.com/instructions/about-vulnerabilities/#quarantine" target="_blank" rel="noopener noreferrer">${text}</a>
</div>
</div>
`);
}
});
});
</script>
<?php
echo ob_get_clean();
}
/* End of theme files section */
/* Private functions | Filtering and walks */
/**
* Filters the components based on the active plugins
*
* @param $components
* @param array $active_plugins
*
* @return array
*/
private function filter_active_components($components, array $active_plugins): array
{
$active_components = [];
foreach ($components as $component) {
foreach ($active_plugins as $active_plugin) {
if (isset($component->slug) && $component->slug === $active_plugin['Slug']) {
//now we filter out the relevant vulnerabilities
$component->vulnerabilities = $this->filter_vulnerabilities($component->vulnerabilities, $active_plugin['Version']);
//if we have vulnerabilities, we add the component to the active components or when the plugin is closed
if (count($component->vulnerabilities) > 0 || $component->status === 'closed') {
$active_components[] = $component;
}
}
}
}
return $active_components;
}
/**
* This function adds the vulnerability with the highest risk to the plugins page
*
* @param $vulnerabilities
*
* @return string
*/
private function get_highest_vulnerability($vulnerabilities): string
{
//we loop through the vulnerabilities and get the highest risk level
$highest_risk_level = 0;
foreach ($vulnerabilities as $vulnerability) {
if ($vulnerability->severity === null) {
continue;
}
if (!isset($this->risk_levels[$vulnerability->severity])) {
continue;
}
if ($this->risk_levels[$vulnerability->severity] > $highest_risk_level) {
$highest_risk_level = $this->risk_levels[$vulnerability->severity];
}
}
//we now loop through the risk levels and return the highest one
foreach ($this->risk_levels as $key => $value) {
if ($value === $highest_risk_level) {
return $key;
}
}
return 'l';
}
/* End of private functions | Filtering and walks */
/* Private functions | End of Filtering and walks */
/* Private functions | Feedback, Styles and scripts */
/**
* This function shows the feedback in the plugin
*
* @return void
*/
private function enable_feedback_in_plugin(): void {
//we add some styling to this page
add_action('admin_enqueue_scripts', array($this, 'add_vulnerability_styles'));
//we add an extra column to the plugins page
add_filter('manage_plugins_columns', array($this, 'add_vulnerability_column'));
add_filter('manage_plugins-network_columns', array($this, 'add_vulnerability_column'));
//now we add the field to the plugins page
add_action('manage_plugins_custom_column', array($this, 'add_vulnerability_field'), 10, 3);
add_action('manage_plugins-network_custom_column', array($this, 'add_vulnerability_field'), 10, 3);
}
/* End of private functions | Feedback, Styles and scripts */
/**
* This function downloads the manifest file from the api server
*
* @return void
*/
private function download_manifest(): void {
if ( ! rsssl_admin_logged_in() ) {
return;
}
$url = self::RSSSL_SECURITY_API . 'manifest.json';
$data = $this->download($url);
//we convert the data to an array
$data = json_decode(json_encode($data), true);
//first we store this as a json file in the uploads folder
$this->store_file($data, true, true);
}
/**
* This function downloads the created file from the uploads
*
* @return false|void
*/
private function getManifest()
{
if ( ! rsssl_admin_logged_in() ) {
return false;
}
$upload_dir = Rsssl_File_Storage::get_upload_dir();
$file = $upload_dir . '/manifest.json';
if (!file_exists($file)) {
return false;
}
return Rsssl_File_Storage::GetFile($file);
}
private function filter_vulnerabilities($vulnerabilities, $Version, $core = false): array {
$filtered_vulnerabilities = array();
foreach ( $vulnerabilities as $vulnerability ) {
//if fixed_in contains a version, and the current version is higher than the fixed_in version, we skip it as fixed.
//This needs to be a positive check only, as the fixed_in value is less accurate than the version_from and version_to values
if ( function_exists( 'rsssl_version_compare' ) ) {
if ( $vulnerability->fixed_in !== 'not fixed' && rsssl_version_compare( $Version, $vulnerability->fixed_in, '>=' ) ) {
continue;
}
} else {
# fallback
if ( $vulnerability->fixed_in !== 'not fixed' && version_compare( $Version, $vulnerability->fixed_in, '>=' ) ) {
continue;
}
}
//we have the fields version_from and version_to and their needed operators
$version_from = $vulnerability->version_from;
$version_to = $vulnerability->version_to;
$operator_from = $vulnerability->operator_from;
$operator_to = $vulnerability->operator_to;
//we now check if the version is between the two versions
if ( function_exists( 'rsssl_version_compare' ) ) {
if ( rsssl_version_compare( $Version, $version_from, $operator_from ) && rsssl_version_compare( $Version, $version_to, $operator_to ) ) {
$filtered_vulnerabilities[] = $vulnerability;
}
} else {
if ( version_compare( $Version, $version_from, $operator_from ) && version_compare( $Version, $version_to, $operator_to ) ) {
$filtered_vulnerabilities[] = $vulnerability;
}
}
}
return $filtered_vulnerabilities;
}
/**
* Get count of risk occurrence for each risk level
* @return array
*/
public function count_risk_levels(): array {
$plugins = $this->workable_plugins;
$risk_levels = array();
foreach ($plugins as $plugin) {
if (isset($plugin['risk_level'])) {
if (isset($risk_levels[$plugin['risk_level']])) {
$risk_levels[$plugin['risk_level']]++;
} else {
$risk_levels[$plugin['risk_level']] = 1;
}
}
}
return $risk_levels;
}
/**
* check if a a dismissed notice should be reset
*
* @param string $risk_level
*
* @return bool
*/
private function should_reset_notification(string $risk_level): bool {
$plugins = $this->workable_plugins;
$vulnerable_plugins = array();
foreach ($plugins as $plugin) {
if (isset($plugin['risk_level']) && $plugin['risk_level'] === $risk_level) {
$vulnerable_plugins[] = $plugin['rss_identifier'];
}
}
$dismissed_for = get_option("rsssl_{$risk_level}_notification_dismissed_for",[]);
//cleanup. Check if plugins in mail_sent_for exist in the $plugins array
foreach ($dismissed_for as $key => $rss_identifier) {
if ( ! in_array($rss_identifier, $vulnerable_plugins) ) {
unset($dismissed_for[$key]);
}
}
$diff = array_diff($vulnerable_plugins, $dismissed_for);
foreach ($diff as $rss_identifier) {
if (!in_array($rss_identifier, $dismissed_for)){
$dismissed_for[] = $rss_identifier;
}
}
//add the new plugins to the $dismissed_for array
update_option("rsssl_{$risk_level}_notification_dismissed_for", $dismissed_for, false );
return !empty($diff);
}
/**
* check if a new mail should be sent about vulnerabilities
* @return bool
*/
private function should_send_mail(): bool {
$plugins = $this->workable_plugins;
$vulnerable_plugins = array();
foreach ($plugins as $plugin) {
if (isset($plugin['risk_level'])) {
$vulnerable_plugins[] = $plugin['rss_identifier'];
}
}
$mail_sent_for = get_option('rsssl_vulnerability_mail_sent_for',[]);
//cleanup. Check if plugins in mail_sent_for exist in the $plugins array
foreach ($mail_sent_for as $key => $rss_identifier) {
if ( ! in_array($rss_identifier, $vulnerable_plugins) ) {
unset($mail_sent_for[$key]);
}
}
$diff = array_diff($vulnerable_plugins, $mail_sent_for);
foreach ($diff as $rss_identifier) {
if (!in_array($rss_identifier, $mail_sent_for)){
$mail_sent_for[] = $rss_identifier;
}
}
//add the new plugins to the mail_sent_for array
update_option('rsssl_vulnerability_mail_sent_for',$mail_sent_for, false );
return !empty($diff);
}
/**
* Get id by risk level
* @param array $vulnerabilities
* @param string $risk_level
*
* @return mixed|void
*/
private function getLinkedUUID( array $vulnerabilities, string $risk_level)
{
foreach ($vulnerabilities as $vulnerability) {
if ($vulnerability->severity === $risk_level) {
return $vulnerability->rss_identifier;
}
}
}
private function getLinkedDate($vulnerabilities, string $risk_level)
{
foreach ($vulnerabilities as $vulnerability) {
if ($vulnerability->severity === $risk_level) {
//we return the date in a readable format
return date(get_option('date_format'), strtotime($vulnerability->published_date));
}
}
}
/**
* Send email warning
* @return void
*/
public function send_vulnerability_mail(): void {
if ( ! rsssl_admin_logged_in() ) {
return;
}
//first we check if the user wants to receive emails
if ( !rsssl_get_option('send_notifications_email') ) {
return;
}
$level_for_email = rsssl_get_option('vulnerability_notification_email_admin');
if ( !$level_for_email || $level_for_email === '*' ) {
return;
}
//now based on the risk level we send a different email
$risk_levels = $this->count_risk_levels();
$total = 0;
$blocks = [];
foreach ($risk_levels as $risk_level => $count) {
if ( $this->risk_levels[$risk_level] >= $this->risk_levels[$level_for_email] ) {
$blocks[] = $this->createBlock($risk_level, $count);
$total += $count;
}
}
//date format is named month day year
$mailer = new rsssl_mailer();
$mailer->subject = sprintf(__("Vulnerability Alert: %s", "really-simple-ssl"), $this->site_url() );
$mailer->title = sprintf(_n("%s: %s vulnerability found", "%s: %s vulnerabilities found", $total, "really-simple-ssl"), $this->date(), $total);
$message = sprintf(__("This is a vulnerability alert from Really Simple Security for %s. ","really-simple-ssl"), $this->domain() );
$mailer->message = $message;
$mailer->warning_blocks = $blocks;
if ($total > 0) {
//if for some reason the total is 0, we don't send an email
$mailer->send_mail();
}
}
/**
* Create an email block by risk level
*
* @param string $risk_level
* @param int $count
*
* @return array
*/
protected function createBlock(string $risk_level, int $count): array
{
$plugin_name = '';
//if we have only one plugin with this risk level, we can show the plugin name
//we search it in the list
if ( $count===1 ){
$plugins = $this->workable_plugins;
foreach ($plugins as $plugin) {
if (isset($plugin['risk_level']) && $plugin['risk_level'] === $risk_level) {
$plugin_name = $plugin['Name'];
}
}
}
$risk = $this->risk_naming[$risk_level];
$title = $this->get_warning_string($risk_level, $count);
$message = $count === 1 ? sprintf(__("A %s vulnerability is found in %s.", "really-simple-ssl"),$risk, $plugin_name) : sprintf(__("Multiple %s vulnerabilities have been found.", "really-simple-ssl"), $risk);
return [
'title' => $title,
'message' => $message . ' ' .
__('Based on your settings, Really Simple Security will take appropriate action, or you will need to solve it manually.','really-simple-ssl') .' '.
sprintf(__('Get more information from the Really Simple Security dashboard on %s'), $this->domain() ),
'url' => rsssl_admin_url( [], '#settings/vulnerabilities_notifications'),
];
}
/**
* @param string $risk_level
* @param int $count
*
* @return string
*/
public function get_warning_string( string $risk_level, int $count): string {
switch ($risk_level){
case 'c':
$warning = sprintf(_n('You have %s critical vulnerability', 'You have %s critical vulnerabilities', $count, 'really-simple-ssl'), $count);
break;
case 'h':
$warning = sprintf(_n('You have %s high-risk vulnerability', 'You have %s high-risk vulnerabilities', $count, 'really-simple-ssl'), $count);
break;
case 'm':
$warning = sprintf(_n('You have %s medium-risk vulnerability', 'You have %s medium-risk vulnerabilities', $count, 'really-simple-ssl'), $count);
break;
default:
$warning = sprintf(_n('You have %s low-risk vulnerability', 'You have %s low-risk vulnerabilities', $count, 'really-simple-ssl'), $count);
break;
}
return $warning;
}
/**
* Get a nicely formatted date for today's date
*
* @return string
*/
public function date(): string {
return date_i18n( get_option( 'date_format' ));
}
/**
* Get the domain name in a clickable format
*
* @return string
*/
public function domain(): string {
return '<a href="'.$this->site_url().'" target="_blank" rel="noopener noreferrer">'.$this->site_url().'</a>';
}
/**
* Cron triggers may sometimes result in http URL's, even though SSL is enabled in Really Simple Security.
* We ensure that the URL is returned with https if SSL is enabled.
*
* @return string
*/
public function site_url(): string {
$ssl_enabled = rsssl_get_option('ssl_enabled') || is_ssl();
$scheme = $ssl_enabled ? 'https' : 'http';
return get_site_url(null, '', $scheme);
}
}
//we initialize the class
//add_action('init', array(rsssl_vulnerabilities::class, 'instance'));
if ( !defined('rsssl_pro') ) {
$vulnerabilities = new rsssl_vulnerabilities();
}
}
#########################################################################################
# Functions for the vulnerability scanner #
# These functions are used in the vulnerability scanner like the notices and the api's #
#########################################################################################
//we clear all the cache when the vulnerability scanner is enabled
function rsssl_vulnerabilities_api( array $response, string $action, $data ): array {
if ( ! rsssl_user_can_manage() ) {
return $response;
}
switch ($action) {
case 'vulnerabilities_test_notification':
//creating a random string based on time.
$random_string = md5( time() );
update_option( 'test_vulnerability_tester', $random_string, false );
//clear admin notices cache
delete_option('rsssl_admin_notices');
$response = rsssl_vulnerabilities::testGenerator();
break;
case 'vulnerabilities_scan_files':
$response = rsssl_vulnerabilities::firstRun();
break;
case 'vulnerabilities_measures_get':
$response = ( new rsssl_vulnerabilities )->measures_data();
break;
case 'vulnerabilities_measures_set':
$response = ( new rsssl_vulnerabilities )->measures_set($data);
break;
}
return $response;
}
add_filter( 'rsssl_do_action', 'rsssl_vulnerabilities_api', 10, 3 );
/* End of Routing and API's */ |