From cf98853cc017af5b529566de60b223c085a65f7e Mon Sep 17 00:00:00 2001 From: PovilasKondrotas <80691318+PovilasKondrotas@users.noreply.github.com> Date: Wed, 6 Nov 2024 16:26:30 +0200 Subject: [PATCH] Update fix.sh --- fix.sh | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/fix.sh b/fix.sh index f0dbf56..f5cdd4c 100644 --- a/fix.sh +++ b/fix.sh @@ -418,7 +418,7 @@ function func_list_suspicious_file { function func_list_suspicious_file_subdomain { echo -ne "${PURPLE}Enter clients subdomain name (without domain.tld, if subdomain is def.abc.com, enter just def): ${NC}"; read -r subdomainName - suspicious_Encoding=("eval(gzinflate(base64_decode\|eval (gzinflate(base64_decode\|eval(gzinflate (base64_decode\|eval (gzinflate (base64_decode\|eval(base64_decode\|eval (base64_decode\|gzinflate(base64_decode\|gzinflate (base64_decode\|gzinflate") + #suspicious_Encoding=("eval(gzinflate(base64_decode\|eval (gzinflate(base64_decode\|eval(gzinflate (base64_decode\|eval (gzinflate (base64_decode\|eval(base64_decode\|eval (base64_decode\|gzinflate(base64_decode\|gzinflate (base64_decode\|gzinflate") dashed_line=("----------------------------------------------------------------------------------------------") func_domain_selection; cd ~/domains/"${domain_name}"/public_html/"${subdomainName}" || exit @@ -679,9 +679,9 @@ function func_vulnerabilities_checker_all { # WordPress core, plugins, themes for x in domains/*/; do - cd ~/${x}public_html + cd ~/"${x}public_html" || exit printf "=%.0s" {1..85} - printf "\nWorking on "${x}"\n" + printf "\nWorking on %s\n" "$x" date wp core version | curl -X POST -H "Content-Type: application/json" -H "Response-Type: table" http://iskander-api.heiko.xyz/core -d @- wp plugin list --format=json | curl -X POST -H "Content-Type: application/json" -H "Response-Type: table" http://iskander-api.heiko.xyz/plugins -d @- @@ -1143,7 +1143,7 @@ function backup_and_clean_js_injections() { mysqldump -u"$DB_USER" -p"$DB_PASSWORD" -h"$DB_HOST" "$DB_NAME" > "$FULL_BACKUP_FILE" # Create a backup file - BACKUP_FILE="../js_injection_backup_$(date +%Y%m%d_%H%M%S).sql" + #BACKUP_FILE="../js_injection_backup_$(date +%Y%m%d_%H%M%S).sql" LOG_FILE="../js_injection_removal_log_$(date +%Y%m%d_%H%M%S).log" # Tables and columns to check for JavaScript injections @@ -1203,7 +1203,7 @@ function japanese_hack_cleanup() { mysqldump -u"$DB_USER" -p"$DB_PASSWORD" -h"$DB_HOST" "$DB_NAME" > "$FULL_BACKUP_FILE" # Create a backup file - BACKUP_FILE="../malware_backup_$(date +%Y%m%d_%H%M%S).sql" + #BACKUP_FILE="../malware_backup_$(date +%Y%m%d_%H%M%S).sql" LOG_FILE="../removal_log_$(date +%Y%m%d_%H%M%S).log" # Tables and columns to check