/** * Return regular expression to exclude files or false if * there is no pattern * * @return string|boolean */ public static function getExcludeFilePattern() { if (self::$excludePattern !== NULL) { return self::$excludePattern; } if (wfConfig::get('scan_exclude', false)) { $exParts = explode("\n", wfUtils::cleanupOneEntryPerLine(wfConfig::get('scan_exclude'))); foreach ($exParts as &$exPart) { $exPart = preg_quote(trim($exPart), '/'); $exPart = preg_replace('/\\\\\\*/', '.*', $exPart); } self::$excludePattern = '/^(?:' . implode('|', array_filter($exParts)) . ')$/i'; self::$excludePattern = '/(?:' . implode('|', array_filter($exParts)) . ')$/i'; } else { self::$excludePattern = false; } return self::$excludePattern; }
href="http://docs.wordfence.com/en/Wordfence_options#Prevent_discovery_of_usernames_through_.27.3F.2Fauthor.3DN.27_scans" target="_blank" class="wfhelp"></a></th> <td><input type="checkbox" id="loginSec_disableAuthorScan" class="wfConfigElem" name="loginSec_disableAuthorScan" <?php $w->cb('loginSec_disableAuthorScan'); ?> /> </td> </tr> <tr> <th style="vertical-align: top;">Immediately block the IP of users who try to sign in as these usernames<a href="http://docs.wordfence.com/en/Wordfence_options#Immediately_block_the_IP_of_users_who_try_to_sign_in_as_these_usernames" target="_blank" class="wfhelp"></a></th> <td> <textarea name="loginSec_userBlacklist" cols="40" rows="4" id="loginSec_userBlacklist"><?php echo wfUtils::cleanupOneEntryPerLine($w->getHTML('loginSec_userBlacklist')); ?> </textarea><br/> (One per line. Existing users won't be blocked.) </td> </tr> <tr> <td colspan="2"> <div class="wfMarker" id="wfMarkerOtherOptions"></div> <h3 class="wfConfigHeading">Other Options<a href="http://docs.wordfence.com/en/Wordfence_options#Other_Options" target="_blank" class="wfhelp"></a></h3> </td> </tr> <tr>
public static function ajax_saveConfig_callback() { $reload = ''; $opts = wfConfig::parseOptions(); // These are now on the Diagnostics page, so they aren't sent across. foreach (self::$diagnosticParams as $param) { $opts[$param] = wfConfig::get($param); } $emails = array(); foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['alertEmails'])) as $email) { if (strlen($email) > 0) { $emails[] = $email; } } if (sizeof($emails) > 0) { $badEmails = array(); foreach ($emails as $email) { if (!preg_match('/^[^@]+@[a-z0-9-]+(\\.[a-z0-9-]+)*(\\.[a-z]{2,11})$/i', $email)) { $badEmails[] = $email; } } if (sizeof($badEmails) > 0) { return array('errorMsg' => "The following emails are invalid: " . wp_kses(implode(', ', $badEmails), array())); } $opts['alertEmails'] = implode(',', $emails); } else { $opts['alertEmails'] = ''; } $opts['scan_exclude'] = wfUtils::cleanupOneEntryPerLine($opts['scan_exclude']); foreach (explode("\n", $opts['scan_include_extra']) as $regex) { if (@preg_match("/{$regex}/", "") === FALSE) { return array('errorMsg' => "\"" . esc_html($regex) . "\" is not a valid regular expression"); } } $whiteIPs = array(); foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['whitelisted'])) as $whiteIP) { if (strlen($whiteIP) > 0) { $whiteIPs[] = $whiteIP; } } if (sizeof($whiteIPs) > 0) { $badWhiteIPs = array(); $range = new wfUserIPRange(); foreach ($whiteIPs as $whiteIP) { $range->setIPString($whiteIP); if (!$range->isValidRange()) { $badWhiteIPs[] = $whiteIP; } } if (sizeof($badWhiteIPs) > 0) { return array('errorMsg' => "Please make sure you separate your IP addresses with commas. The following whitelisted IP addresses are invalid: " . wp_kses(implode(', ', $badWhiteIPs), array())); } $opts['whitelisted'] = implode(',', $whiteIPs); } else { $opts['whitelisted'] = ''; } $validUsers = array(); $invalidUsers = array(); foreach (explode(',', $opts['liveTraf_ignoreUsers']) as $val) { $val = trim($val); if (strlen($val) > 0) { if (get_user_by('login', $val)) { $validUsers[] = $val; } else { $invalidUsers[] = $val; } } } $opts['loginSec_userBlacklist'] = wfUtils::cleanupOneEntryPerLine($opts['loginSec_userBlacklist']); $opts['apiKey'] = trim($opts['apiKey']); if ($opts['apiKey'] && !preg_match('/^[a-fA-F0-9]+$/', $opts['apiKey'])) { //User entered something but it's garbage. return array('errorMsg' => "You entered an API key but it is not in a valid format. It must consist only of characters A to F and 0 to 9."); } if (sizeof($invalidUsers) > 0) { return array('errorMsg' => "The following users you selected to ignore in live traffic reports are not valid on this system: " . wp_kses(implode(', ', $invalidUsers), array())); } if (sizeof($validUsers) > 0) { $opts['liveTraf_ignoreUsers'] = implode(',', $validUsers); } else { $opts['liveTraf_ignoreUsers'] = ''; } $validIPs = array(); $invalidIPs = array(); foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['liveTraf_ignoreIPs'])) as $val) { if (strlen($val) > 0) { if (wfUtils::isValidIP($val)) { $validIPs[] = $val; } else { $invalidIPs[] = $val; } } } if (sizeof($invalidIPs) > 0) { return array('errorMsg' => "The following IPs you selected to ignore in live traffic reports are not valid: " . wp_kses(implode(', ', $invalidIPs), array())); } if (sizeof($validIPs) > 0) { $opts['liveTraf_ignoreIPs'] = implode(',', $validIPs); } if (preg_match('/[a-zA-Z0-9\\d]+/', $opts['liveTraf_ignoreUA'])) { $opts['liveTraf_ignoreUA'] = trim($opts['liveTraf_ignoreUA']); } else { $opts['liveTraf_ignoreUA'] = ''; } if (!$opts['other_WFNet']) { $wfdb = new wfDB(); global $wpdb; $p = $wpdb->base_prefix; $wfdb->queryWrite("delete from {$p}" . "wfBlocks where wfsn=1 and permanent=0"); } if ($opts['howGetIPs'] != wfConfig::get('howGetIPs', '')) { $reload = 'reload'; } $regenerateHtaccess = false; if (wfConfig::get('bannedURLs', false) != $opts['bannedURLs']) { $regenerateHtaccess = true; } if (!is_numeric($opts['liveTraf_maxRows'])) { return array('errorMsg' => 'Please enter a number for the amount of Live Traffic data to store.'); } foreach ($opts as $key => $val) { if ($key != 'apiKey') { //Don't save API key yet wfConfig::set($key, $val); } } if ($regenerateHtaccess && wfConfig::get('cacheType') == 'falcon') { wfCache::addHtaccessCode('add'); } if ($opts['autoUpdate'] == '1') { wfConfig::enableAutoUpdate(); } else { if ($opts['autoUpdate'] == '0') { wfConfig::disableAutoUpdate(); } } try { if ($opts['disableCodeExecutionUploads']) { wfConfig::disableCodeExecutionForUploads(); } else { wfConfig::removeCodeExecutionProtectionForUploads(); } } catch (wfConfigException $e) { return array('errorMsg' => $e->getMessage()); } if (!empty($opts['email_summary_enabled'])) { wfConfig::set('email_summary_enabled', 1); wfConfig::set('email_summary_interval', $opts['email_summary_interval']); wfConfig::set('email_summary_excluded_directories', $opts['email_summary_excluded_directories']); wfActivityReport::scheduleCronJob(); } else { wfConfig::set('email_summary_enabled', 0); wfActivityReport::disableCronJob(); } if (wfConfig::get('other_hideWPVersion')) { wfUtils::hideReadme(); } else { wfUtils::showReadme(); } $paidKeyMsg = false; if (!$opts['apiKey']) { //Empty API key (after trim above), then try to get one. $api = new wfAPI('', wfUtils::getWPVersion()); try { $keyData = $api->call('get_anon_api_key'); if ($keyData['ok'] && $keyData['apiKey']) { wfConfig::set('apiKey', $keyData['apiKey']); wfConfig::set('isPaid', 0); $reload = 'reload'; } else { throw new Exception("We could not understand the Wordfence server's response because it did not contain an 'ok' and 'apiKey' element."); } } catch (Exception $e) { return array('errorMsg' => "Your options have been saved, but we encountered a problem. You left your API key blank, so we tried to get you a free API key from the Wordfence servers. However we encountered a problem fetching the free key: " . wp_kses($e->getMessage(), array())); } } else { if ($opts['apiKey'] != wfConfig::get('apiKey')) { $api = new wfAPI($opts['apiKey'], wfUtils::getWPVersion()); try { $res = $api->call('check_api_key', array(), array()); if ($res['ok'] && isset($res['isPaid'])) { wfConfig::set('apiKey', $opts['apiKey']); $reload = 'reload'; wfConfig::set('isPaid', $res['isPaid']); //res['isPaid'] is boolean coming back as JSON and turned back into PHP struct. Assuming JSON to PHP handles bools. if ($res['isPaid']) { $paidKeyMsg = true; } } else { throw new Exception("We could not understand the Wordfence API server reply when updating your API key."); } } catch (Exception $e) { return array('errorMsg' => "Your options have been saved. However we noticed you changed your API key and we tried to verify it with the Wordfence servers and received an error: " . wp_kses($e->getMessage(), array())); } } else { $api = new wfAPI($opts['apiKey'], wfUtils::getWPVersion()); $api->call('ping_api_key', array(), array()); } } return array('ok' => 1, 'reload' => $reload, 'paidKeyMsg' => $paidKeyMsg); }
/** * Return regular expression to exclude files or false if * there is no pattern * * @param $whichPatterns int Bitmask indicating which patterns to include. * @return string|boolean */ public static function getExcludeFilePattern($whichPatterns = self::EXCLUSION_PATTERNS_USER) { if (isset(self::$excludePatterns[$whichPatterns])) { return self::$excludePatterns[$whichPatterns]; } $exParts = array(); if (($whichPatterns & self::EXCLUSION_PATTERNS_USER) > 0) { if (wfConfig::get('scan_exclude', false)) { $exParts = explode("\n", wfUtils::cleanupOneEntryPerLine(wfConfig::get('scan_exclude'))); } } foreach (self::$builtinExclusions as $pattern) { if (($pattern['include'] & $whichPatterns) > 0) { $exParts[] = $pattern['pattern']; } } if (!empty($exParts)) { foreach ($exParts as &$exPart) { $exPart = preg_quote(trim($exPart), '/'); $exPart = preg_replace('/\\\\\\*/', '.*', $exPart); } //self::$excludePattern = '/^(?:' . implode('|', array_filter($exParts)) . ')$/i'; self::$excludePatterns[$whichPatterns] = '/(?:' . implode('|', array_filter($exParts)) . ')$/i'; } else { self::$excludePatterns[$whichPatterns] = false; } return self::$excludePatterns[$whichPatterns]; }
target="_blank" class="wfhelp"></a></th> <td><input type="checkbox" id="scansEnabled_highSense" class="wfConfigElem" name="scansEnabled_highSense" value="1" <?php $w->cb('scansEnabled_highSense'); ?> /> </td> </tr> <tr> <th>Exclude files from scan that match these wildcard patterns. (One per line).<a href="http://docs.wordfence.com/en/Wordfence_options#Exclude_files_from_scan_that_match_these_wildcard_patterns." target="_blank" class="wfhelp"></a></th> <td> <textarea id="scan_exclude" class="wfConfigElem" cols="40" rows="4" name="scan_exclude"><?php echo wfUtils::cleanupOneEntryPerLine($w->getHTML('scan_exclude')); ?> </textarea> </td> </tr> <tr> <td colspan="2"> <div class="wfMarker" id="wfMarkerFirewallRules"></div> <h3 class="wfConfigHeading">Firewall Rules<a href="http://docs.wordfence.com/en/Wordfence_options#Firewall_Rules" target="_blank" class="wfhelp"></a></h3> </td> </tr> <tr> <th>Immediately block fake Google crawlers:<a href="http://docs.wordfence.com/en/Wordfence_options#Immediately_block_fake_Google_crawlers:"