WPBullet : A Static Code Analysis For WordPress & PHP

WPBullet is a static code analysis for WordPress Plugins/Themes (and PHP). Simply clone the repository, install requirements and run the script ;

git clone https://github.com/webarx-security/wpbullet wpbullet
cd wpbullet
pip install -r requirements.txt
python wpbullet.py

Available options:

–path (required) System path or download URL
Examples:
–path=”/path/to/plugin”
–path=”https://wordpress.org/plugins/example-plugin”
–path=”https://downloads.wordpress.org/plugin/example-plugin.1.5.zip”

–enabled (optional) Check only for given modules, ex. –enabled=”SQLInjection,CrossSiteScripting”
–disabled (optional) Don’t check for given modules, ex. –disabled=”SQLInjection,CrossSiteScripting”
–cleanup (optional) Automatically remove content of .temp folder after scanning remotely downloaded plugin

$ python wpbullet.py –path=”/var/www/wp-content/plugins/plugin-name”

Also Read – Top Paying Pay per Click Affiliate Programs for Beginners

Creating Modules

Creating a module is flexible and allows for override of the BaseClass methods for each module as well as creating their own methods

Each module in Modules directory is implementing properties and methods from core.modules.BaseClass, thus each module’s required parameter is BaseClass

Once created, module needs to be imported in modules/__init__.py. Module and class name must be consistent in order to module to be loaded.

If you are opening pull request to add new module, please provide unit tests for your module as well.

Module Template

Modules/ExampleVulnerability.py

from core.modules import BaseClass

class ExampleVulnerability(object):

# Vulnerability name name = “Cross-site Scripting”
# Vulnerability severity severity = “Low-Medium”
# Functions causing vulnerability functions = [ “print” “echo” ]
# Functions/regex that prevent exploitation blacklist = [ “htmlspecialchars”, “esc_attr” ]

Overriding regex match pattern

Regex pattern is being generated in core.modules.BaseClass.build_pattern and therefore can be overwritten in each module class.

Modules/ExampleVulnerability.py

import copy…

Build dynamic regex pattern to locate vulnerabilities in given content

def build_pattern(self, content, file):
user_input = copy.deepcopy(self.user_input)

variables = self.get_input_variables(self, content)

if variables:
user_input.extend(variables)

if self.blacklist:
blacklist_pattern = r”(?!(\s?)+(.*(” + ‘|’.join(self.blacklist) + “)))”

else:
blacklist_pattern = “”

self.functions = [self.functions_prefix + x for x in self.functions]

pattern = r”((” + ‘|’.join(self.functions) + “)\s{0,}\(?\s{0,1}” + blacklist_pattern + “.*(” + ‘|’.join(user_input) + “).*)” return pattern

Testing

Running unit tests:

$ python3 -m unittest

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago