CN108154034A - Leak analysis method and device based on WordPress - Google Patents

Leak analysis method and device based on WordPress Download PDF

Info

Publication number
CN108154034A
CN108154034A CN201711394336.0A CN201711394336A CN108154034A CN 108154034 A CN108154034 A CN 108154034A CN 201711394336 A CN201711394336 A CN 201711394336A CN 108154034 A CN108154034 A CN 108154034A
Authority
CN
China
Prior art keywords
wordpress
vulnerability information
information
target vulnerability
leak analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711394336.0A
Other languages
Chinese (zh)
Other versions
CN108154034B (en
Inventor
宋伟
沈龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201711394336.0A priority Critical patent/CN108154034B/en
Publication of CN108154034A publication Critical patent/CN108154034A/en
Application granted granted Critical
Publication of CN108154034B publication Critical patent/CN108154034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The present invention provides a kind of leak analysis method and devices based on WordPress, are related to Hole Detection field.Leak analysis method based on WordPress is applied to server-side, should include obtaining the target vulnerability information of WordPress on common platform;The api interface of WordPress is called, the data information of multiple components, template and plug-in unit is obtained according to utilization rate;Target vulnerability information and multiple data informations are associated analysis, obtain the leak analysis result of each target vulnerability information;According to the leak analysis result generation leak analysis report of each target vulnerability information, and leak analysis is reported to the user terminal for being pushed to pre-configuration.Vulnerability information in leak analysis method and device energy comprehensive collection internet provided by the invention based on WordPress about WordPress, and user can be reminded to update patch or more new version, with patching bugs.

Description

Leak analysis method and device based on WordPress
Technical field
The present invention relates to Hole Detection field, in particular to a kind of leak analysis method based on WordPress and Device.
Background technology
WordPress is a Content Management System at home and abroad keeping installation amount for a long time, has more than one hundred million independent uses User, differ however, as numerous developer's levels, the loophole of WordPress caused to occur frequently.At present, domestic and international each grand duke Open-drain hole distribution platform, most of platforms are comprehensive loophole distribution platform, and concern target is hardware device leakage on internet Hole, application server loophole, major Loopholes of OS, web application loophole.Content is relatively numerous and jumbled, does not have specially One property, it is impossible to make comprehensive vulnerability information collection work for WordPress.
Therefore, a kind of effective scheme how is provided to realize that the loophole to WordPress makes comprehensive leak analysis, It is a current big subject to be solved.
Invention content
In view of this, the embodiment of the present invention be designed to provide a kind of leak analysis method based on WordPress and Device, to improve the above problem.
In a first aspect, a kind of leak analysis method based on WordPress provided in an embodiment of the present invention, applied to service End, the method includes:
Obtain the target vulnerability information of the WordPress on common platform;
The api interface of the WordPress is called, the data that multiple components, template and plug-in unit are obtained according to utilization rate are believed Breath;
The target vulnerability information and multiple data informations are associated analysis, obtain each target loophole The leak analysis result of information;
According to the leak analysis result generation leak analysis report of each target vulnerability information, and the loophole is divided Analysis report is pushed to the user terminal of pre-configuration.
Optionally, the target vulnerability information for obtaining the WordPress on common platform, including:
Crawl on the common platform with the associated content informations of the WordPress;
The content information is screened by keyword to obtain target vulnerability information.
Optionally, it is described that the content information is screened by keyword to obtain target vulnerability information, including:
With loophole title, loophole type, CVE numbers, leak number, version number, object oriented and validating vulnerability code At least one of as keyword, the content information is screened to obtain the target vulnerability information.
Optionally, the data information includes loophole type, loophole coverage and influences object, described by the mesh Mark vulnerability information is associated analysis with multiple data informations, obtains the leak analysis knot of each target vulnerability information Fruit, including:
The target vulnerability information is associated analysis with corresponding data information in multiple data informations, is obtained The each corresponding loophole type of the target vulnerability information, loophole coverage, influence object and the extent of injury.
Optionally, the target vulnerability information for obtaining the WordPress on common platform, including:
Interval obtains the target vulnerability information of the WordPress on common platform at predetermined time intervals.
Second aspect, an embodiment of the present invention provides a kind of leak analysis device based on WordPress, applied to service End, the leak analysis device based on WordPress include:
First acquisition module, for obtaining the target vulnerability information of the WordPress on common platform;
For calling the api interface of the WordPress, multiple components, mould are obtained according to utilization rate for second acquisition module The data information of plate and plug-in unit;
Analysis module for the target vulnerability information and multiple data informations to be associated analysis, obtains every The leak analysis result of a target vulnerability information;
Generation module, for the leak analysis result generation leak analysis report according to each target vulnerability information;
Sending module, for leak analysis report to be pushed to the user terminal of pre-configuration.
Optionally, first acquisition module includes:
Crawl submodule, for crawl on the common platform with the associated content informations of the WordPress;
Submodule is screened, is screened to obtain target vulnerability information for passing through keyword to the content information.
Optionally, it is described screening submodule be used for loophole title, loophole type, CVE numbers, leak number, version number, At least one of object oriented and validating vulnerability code are used as keyword, the content information are screened to obtain described Target vulnerability information.
Optionally, the data information includes loophole type, loophole coverage and influences object, the analysis module For the target vulnerability information to be associated analysis with corresponding data information in multiple data informations, obtain each The target vulnerability information corresponding loophole type, influences object and the extent of injury at loophole coverage.
Optionally, first acquisition module obtains described on common platform for interval at predetermined time intervals The target vulnerability information of WordPress.
For the prior art, the leak analysis method and device provided by the invention based on WordPress has following Advantageous effect:
In leak analysis method and device comprehensive collection internet provided by the invention based on WordPress about The vulnerability information of WordPress, with reference to the data of the forward component of the utilization rate of WordPress officials publication, template and plug-in unit Information is associated analysis, and ultimately forms leak analysis report and send the user terminal for giving configuration, so reminds and uses in time Family updates patch or more new version, with patching bugs.
For the above objects, features and advantages of the present invention is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It in order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range, for those of ordinary skill in the art, without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram that the server-side that present pre-ferred embodiments provide is interacted with user terminal.
Fig. 2 is the block diagram of server-side that present pre-ferred embodiments provide.
Fig. 3 is the flow chart of the leak analysis method based on WordPress that present pre-ferred embodiments provide.
Fig. 4 is the flow chart of the sub-step of step S101 in Fig. 3.
Fig. 5 is the function module signal for the leak analysis device based on WordPress that present pre-ferred embodiments provide Figure.
Fig. 6 is the high-level schematic functional block diagram of the first acquisition module that present pre-ferred embodiments provide.
Icon:100- server-sides;Leak analysis devices of the 110- based on WordPress;The first acquisition modules of 111-; 1111- crawls submodule;1113- screens submodule;The second acquisition modules of 113-;115- analysis modules;117- generation modules; 119- sending modules;130- memories;150- processors;170- communication units;200- user terminals;300- networks.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be configured to arrange and design with a variety of different herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained under the premise of creative work, shall fall within the protection scope of the present invention.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need to that it is further defined and explained in subsequent attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
As shown in Figure 1, it is that the server-side 100 that present pre-ferred embodiments provide is shown with what user terminal 200 interacted It is intended to.The server-side 100 is communicatively coupled by network 300 and one or more user terminals 200, is led to carrying out data Letter or interaction.The server-side 100 can be network server, database server etc..The user terminal 200 can be People's computer (personal computer, PC), tablet computer, smart mobile phone, personal digital assistant (personal digital Assistant, PDA) etc..
As shown in Fig. 2, it is the block diagram of the server-side 100.The server-side 100 is included based on WordPress Leak analysis device 110, memory 130, processor 150 and communication unit 170.
The memory 130, processor 150 and 170 each element of communication unit are directly or indirectly electrical between each other Connection, to realize the transmission of data or interaction.For example, these elements can pass through one or more communication bus or letter between each other Number line, which is realized, to be electrically connected.The leak analysis device 110 based on WordPress include it is at least one can be with software or firmware (firmware) form is stored in the memory 130 or is solidificated in the operating system of the server-side 100 Software function module in (operating system, OS).The processor 150 is deposited for performing in the memory 130 The executable module of storage, such as software function module and meter included by the leak analysis device 110 based on WordPress Calculation machine program etc..
Wherein, the memory 130 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 130 is for storing program, the processor 150 after execute instruction is received, Perform described program.The communication unit 170 is used to establish the server-side 100 and user end by the network 300 Communication connection between end 200, and for passing through 300 transceiving data of network.
Referring to Fig. 3, be present pre-ferred embodiments provide be applied to the loophole shown in Fig. 2 based on WordPress The flow chart of the leak analysis method based on WordPress of analytical equipment 110.Below will to idiographic flow shown in Fig. 3 into Row elaborates.
Step S101 obtains the target vulnerability information of the WordPress on common platform.
In the embodiment of the present invention, server-side 100 is equipped with for the application program of WordPress leak analysis.Server-side 100 when the loophole to WordPress is analyzed, and obtains WordPress's from common platform by web crawlers first Target vulnerability information.
Referring to Fig. 4, the step of obtaining the target vulnerability information of WordPress specifically includes following sub-step.
Sub-step S1011, crawl on the common platform with the associated content informations of the WordPress.
Server-side 100 is encoded with corresponding crawlers, and server-side 100 is spaced pair at predetermined time intervals by crawlers Content information on common platform is crawled, and is included the content information of " WordPress ", i.e., is closed with WordPress The content information of connection.
In the embodiment of the present invention, the common platform refers to, both at home and abroad disclosed loophole distribution platform, as Twitter, Social medias platform such as Facebook, GitHub, microblogging etc..
Sub-step S1012 screens the content information by keyword to obtain target vulnerability information.
Obtain on common platform with after the associated content informations of the WordPress, server-side 100 is by currently known leakage At least one of hole title, loophole type, CVE numbers, leak number, version number, object oriented, validating vulnerability code etc. work For keyword, which is screened to obtain target vulnerability information.And target vulnerability information is stored to server-side 100 Database in.Include loophole title, loophole type, CVE numbers, leak number, version number, object in target vulnerability information At least one of parameters such as title, validating vulnerability code.
Step S102 calls the api interface of WordPress, and the number of multiple components, template and plug-in unit is obtained according to utilization rate It is believed that breath.
At the same time, server-side 100 calls the api interface timing of WordPress to inquire the publication situation of official version, and The data information of the forward multiple components of currently used rate, template and plug-in unit is obtained according to utilization rate (being downloaded number), and will In the data information memory to database got, data information includes loophole type, loophole coverage and influences object Deng.Wherein, loophole coverage refers to the version scope for the WordPress that loophole is influenced.It influences object and refers to loophole institute shadow Component, template or the plug-in unit rung, for example, loophole influences A components, then the influence object in the data information is A components.
It should be noted that the sequence of step S101 and step S102 does not limit in the embodiment of the present invention.
Target vulnerability information and multiple data informations are associated analysis by step S103, obtain each target loophole letter The leak analysis result of breath.
Data information includes loophole type, loophole coverage and influences the parameters such as object.Server-side 100 obtains public The data letter of the target vulnerability information of the WordPress and forward multiple components of currently used rate, template and plug-in unit on platform After breath, target vulnerability information data information corresponding with multiple data informations is associated analysis, obtains each target leakage Information corresponding loophole type in hole, influences object and the extent of injury at loophole coverage.
Wherein, target vulnerability information data information corresponding with multiple data informations refers to, corresponding to the vulnerability information Loophole and the data information corresponding to loophole be same loophole.
Such as:It is assumed that the target vulnerability information kind obtained, entitled " the WordPress Plugin WooCommerce of loophole 2.0/3.0-Directory Traversal " influences version for WordPress 4.8.3, and CVE numbers are CVE-2017- 17058, there is vulnerability exploit code.Then, the plugin name in target vulnerability information is " WooCommerce ", and version number is " 2.0/3.0 ", loophole type are " Directory Traversal ".
At this point, server-side 100 is by the plugin name " WooCommerce " in target vulnerability information and stores in the database The forward multiple components of utilization rate, template and plug-in unit data information matched.It is assumed that it matches there are plugin name (i.e. Influence object) be " WooCommerce " data information, and latest edition be 3.2.5, active installation number be more than 3,000,000.
Then server-side 100 judges that its loophole endangers journey by assigning weights to the parameters in data above information Degree.Such as:Loophole type is directory traversal loophole, for middle dangerous loophole.It is 2.0 to 3.0 to influence version scope, relative to latest edition 3.2.5, damaging range is medium.Loophole existence position (influencing object) is plug-in unit, not WordPress main programs, so It is medium to endanger.Installation number is more than 3,000,000, and influence degree is high in being.Its loophole extent of injury of integrated judgment is middle danger The leak analysis result of dangerous loophole, i.e. the target vulnerability information is middle dangerous loophole.
By above-mentioned mode, server-side 100 can obtain the leak analysis result of each target vulnerability information.
Step S104, according to the leak analysis result generation leak analysis report of each target vulnerability information, and by loophole Analysis report is pushed to the user terminal of pre-configuration.
After the leak analysis result for obtaining each target vulnerability information, server-side 100 is mainly with the loophole in vulnerability information Coverage (version influenced) influences the parameters such as object (component, template or plug-in unit) for major parameter, generation loophole point Analysis report.Establish WordPress leak analysis report templates simultaneously.When finding newest loophole, pass through above step association point After analysis obtains result, leak analysis report is automatically generated.
Server-side 100 is pre-configured with multiple user terminals 200, after server-side 100 generates leak analysis report, server-side 100 give the leak analysis report active push of generation the user terminal 200 of all pre-configurations, to remind user terminal 200 The timely user of user updates patch or more new version, with patching bugs.
To sum up, the leak analysis method provided in an embodiment of the present invention based on WordPress is by between at predetermined time intervals Every obtaining, the target vulnerability information of WordPress and calling official api interface acquisition WordPress on common platform are current The data information of the forward multiple components of utilization rate, template and plug-in unit, and target vulnerability information is associated with data information Analysis obtains leak analysis as a result, leak analysis result finally is sent to user terminal 200.It so, it is possible more comprehensive Timing finds the WordPress loopholes on internet.Meanwhile leak analysis report is based on loophole coverage (version of influence) It is generated with the parameters such as object (component, template or plug-in unit) are influenced, user can facilitate according to loophole coverage and influence object Determine whether own website is influenced by new loophole.In addition, having automatic push function, it can quickly push and leak to user Hole early warning information, to remind the user of user terminal 200 that timely user updates patch or more new version, with patching bugs.
Referring to Fig. 5, it is the leak analysis dress shown in Fig. 2 based on WordPress that present pre-ferred embodiments provide Put 110 high-level schematic functional block diagram.The leak analysis device 110 based on WordPress include the first acquisition module 111, Second acquisition module 113, analysis module 115, generation module 117 and sending module 119.
First acquisition module 111 is used to obtain the target vulnerability information of the WordPress on common platform.
In the embodiment of the present invention, when the loophole to WordPress is analyzed, the first acquisition module of server-side 100 111 obtain the target vulnerability information of WordPress by web crawlers from common platform first.
Referring to Fig. 6, the first acquisition module 111, which includes, crawls submodule 1111 and screening submodule 1113.Crawl son Module 1111 is used to crawl on the common platform and the associated content informations of the WordPress.Screening submodule 1113 is used In being screened to obtain target vulnerability information to the content information by keyword.
It should be understood that first acquisition module 111 can be used for performing above-mentioned step S101, it is described to crawl submodule Block 1111 can be used for performing above-mentioned step S1011, and the screening submodule 1113 can be used for performing above-mentioned step S1012。
Second acquisition module 113 is used to call the api interface of WordPress, and multiple components, template are obtained according to utilization rate With the data information of plug-in unit.
At the same time, server-side 100 calls the api interface timing inquiry official of WordPress by the second acquisition module 113 The publication situation of square version, and according to utilization rate (being downloaded number) obtain the forward multiple components of currently used rate, template and The data information of plug-in unit, and by the data information memory to database got, data information includes loophole type, loophole shadow It rings range and influences object etc..
It should be understood that second acquisition module 113 can be used for performing above-mentioned step S102.
Analysis module 115 is used to target vulnerability information and multiple data informations being associated analysis, obtains each target The leak analysis result of vulnerability information.
Data information includes loophole type, loophole coverage and influences the parameters such as object.It obtains on common platform The target vulnerability information of the WordPress and forward multiple components of currently used rate, template and plug-in unit data information after, clothes Target vulnerability information data information corresponding with multiple data informations is associated point by business end 100 by analysis module 115 Analysis obtains the corresponding loophole type of each target vulnerability information, loophole coverage, influences object and the extent of injury.
It should be understood that the analysis module 115 can be used at least the above step S103.
Generation module 117 is used for the leak analysis result generation leak analysis report according to each target vulnerability information.
After the leak analysis result for obtaining each target vulnerability information, server-side 100 is by generation module 117 mainly to leak The parameters such as loophole coverage (version influenced), influence object (component, template or plug-in unit) in the information of hole are main Parameter, generation leak analysis report.
It should be understood that the generation module 117 can be used for performing in above-mentioned steps S104 according to each target loophole The leak analysis result generation leak analysis of information reports this process.
Sending module 119 is pushed to the user terminal of pre-configuration for that will report leak analysis.
Server-side 100 is pre-configured with multiple user terminals 200, and after generation leak analysis report, server-side 100 passes through hair User terminal 200 of the module 119 by the leak analysis report active push of generation to all pre-configurations is sent, to remind user terminal The 200 timely user of user updates patch or more new version, with patching bugs.
Leak analysis report is pushed away it should be understood that the sending module 119 can be used for performing in above-mentioned steps S104 Give the user terminal of pre-configuration this process.
To sum up, the leak analysis device provided in an embodiment of the present invention based on WordPress can be spaced at predetermined time intervals It obtains the target vulnerability information of WordPress on common platform and official api interface acquisition WordPress is called currently to make It is associated point with the data information of the forward multiple components of rate, template and plug-in unit, and by target vulnerability information and data information Analysis obtains leak analysis as a result, leak analysis result finally is sent to user terminal 200.It is more comprehensively fixed to so, it is possible WordPress loopholes on Shi Faxian internets.Meanwhile leak analysis report based on loophole coverage (version of influence) and The generation of the parameters such as object (component, template or plug-in unit) is influenced, user can facilitate true according to loophole coverage and influence object Determine whether own website is influenced by new loophole.In addition, having automatic push function, quickly loophole can be pushed to user Early warning information, to remind the user of user terminal 200 that timely user updates patch or more new version, with patching bugs.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used to implement holding for defined logic function Row instruction.It should also be noted that at some as in the realization method replaced, the function that is marked in box can also be to be different from The sequence marked in attached drawing occurs.For example, two continuous boxes can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depended on the functions involved.It is it is also noted that every in block diagram and/or flow chart The combination of a box and the box in block diagram and/or flow chart can use function or the dedicated base of action as defined in performing It realizes or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is independent product sale or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform all or part of the steps of the method according to each embodiment of the present invention. And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the packet of nonexcludability Contain so that process, method, article or equipment including a series of elements not only include those elements, but also including It other elements that are not explicitly listed or further includes as elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, also there are other identical elements in article or equipment.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, that is made any repaiies Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exists Similar terms are represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of leak analysis method based on WordPress, applied to server-side, which is characterized in that including:
Obtain the target vulnerability information of the WordPress on common platform;
The api interface of the WordPress is called, the data information of multiple components, template and plug-in unit is obtained according to utilization rate;
The target vulnerability information and multiple data informations are associated analysis, obtain each target vulnerability information Leak analysis result;
According to the leak analysis result generation leak analysis report of each target vulnerability information, and by the leak analysis report Accuse the user terminal for being pushed to pre-configuration.
2. the leak analysis method according to claim 1 based on WordPress, which is characterized in that the acquisition is public The target vulnerability information of the WordPress on platform, including:
Crawl on the common platform with the associated content informations of the WordPress;
The content information is screened by keyword to obtain target vulnerability information.
3. the leak analysis method according to claim 2 based on WordPress, which is characterized in that described to pass through key Word screens the content information to obtain target vulnerability information, including:
With in loophole title, loophole type, CVE numbers, leak number, version number, object oriented and validating vulnerability code It is at least one to be used as keyword, the content information is screened to obtain the target vulnerability information.
4. the leak analysis method according to claim 1 based on WordPress, which is characterized in that the data information Including loophole type, loophole coverage and object is influenced, it is described to believe the target vulnerability information and multiple data Breath be associated analysis, obtain the leak analysis of each target vulnerability information as a result, including:
The target vulnerability information is associated analysis with corresponding data information in multiple data informations, is obtained each The target vulnerability information corresponding loophole type, influences object and the extent of injury at loophole coverage.
5. the leak analysis method according to claim 1 based on WordPress, which is characterized in that the acquisition is public The target vulnerability information of the WordPress on platform, including:
Interval obtains the target vulnerability information of the WordPress on common platform at predetermined time intervals.
6. a kind of leak analysis device based on WordPress, applied to server-side, which is characterized in that described to be based on The leak analysis device of WordPress includes:
First acquisition module, for obtaining the target vulnerability information of the WordPress on common platform;
Second acquisition module, for calling the api interface of the WordPress, according to utilization rate obtain multiple components, template and The data information of plug-in unit;
Analysis module for the target vulnerability information and multiple data informations to be associated analysis, obtains each institute State the leak analysis result of target vulnerability information;
Generation module, for the leak analysis result generation leak analysis report according to each target vulnerability information;
Sending module, for leak analysis report to be pushed to the user terminal of pre-configuration.
7. the leak analysis device according to claim 6 based on WordPress, which is characterized in that described first obtains Module includes:
Crawl submodule, for crawl on the common platform with the associated content informations of the WordPress;
Submodule is screened, is screened to obtain target vulnerability information for passing through keyword to the content information.
8. the leak analysis device according to claim 7 based on WordPress, which is characterized in that the screening submodule Block is used for in loophole title, loophole type, CVE numbers, leak number, version number, object oriented and validating vulnerability code It is at least one as keyword, the content information is screened to obtain the target vulnerability information.
9. the leak analysis device according to claim 6 based on WordPress, which is characterized in that the data information Including loophole type, loophole coverage and influence object, the analysis module be used for by the target vulnerability information with it is more Corresponding data information is associated analysis in a data information, obtains the corresponding loophole of each target vulnerability information Type, influences object and the extent of injury at loophole coverage.
10. the leak analysis device according to claim 6 based on WordPress, which is characterized in that described first obtains Module obtains the target vulnerability information of the WordPress on common platform for interval at predetermined time intervals.
CN201711394336.0A 2017-12-21 2017-12-21 Vulnerability analysis method and device based on WordPress Active CN108154034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711394336.0A CN108154034B (en) 2017-12-21 2017-12-21 Vulnerability analysis method and device based on WordPress

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711394336.0A CN108154034B (en) 2017-12-21 2017-12-21 Vulnerability analysis method and device based on WordPress

Publications (2)

Publication Number Publication Date
CN108154034A true CN108154034A (en) 2018-06-12
CN108154034B CN108154034B (en) 2020-04-07

Family

ID=62464830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711394336.0A Active CN108154034B (en) 2017-12-21 2017-12-21 Vulnerability analysis method and device based on WordPress

Country Status (1)

Country Link
CN (1) CN108154034B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109062638A (en) * 2018-06-15 2018-12-21 平安科技(深圳)有限公司 A kind of system component display methods, computer readable storage medium and terminal device
CN109361707A (en) * 2018-12-13 2019-02-19 北京知道创宇信息技术有限公司 A kind of batch query method, apparatus, server and storage medium
CN110110527A (en) * 2019-05-10 2019-08-09 重庆八戒电子商务有限公司 A kind of discovery method of loophole component, discovery device, computer installation and storage medium
CN111967020A (en) * 2020-08-19 2020-11-20 中国银行股份有限公司 System security vulnerability scanning device and method
CN114024691A (en) * 2020-07-15 2022-02-08 腾讯科技(深圳)有限公司 Vulnerability information processing method, device, equipment and medium based on cloud security
CN115118498A (en) * 2022-06-28 2022-09-27 北京中科微澜科技有限公司 Vulnerability data analysis method and system based on relevance

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404281A (en) * 2010-09-09 2012-04-04 北京神州绿盟信息安全科技股份有限公司 Website scanning device and method
US20130133044A1 (en) * 2011-11-18 2013-05-23 Lockheed Martin Corporation Self-propelled harvesting vehicle including a thermochemical reactor for carbonizing harvested crop material
CN104065645A (en) * 2014-05-28 2014-09-24 北京知道创宇信息技术有限公司 Web vulnerability protection method and apparatus
CN105468981A (en) * 2015-11-20 2016-04-06 上海斐讯数据通信技术有限公司 Vulnerability identification technology-based plugin safety scanning device and scanning method
CN106570403A (en) * 2016-11-02 2017-04-19 北京知道未来信息技术有限公司 Loophole harm degree identification method based on risk model
CN106649429A (en) * 2016-08-25 2017-05-10 北京知道未来信息技术有限公司 Method and device for rapidly evaluating vulnerability hazard level based on multi-dimensional statistics
CN107480533A (en) * 2017-08-08 2017-12-15 深圳市腾讯计算机系统有限公司 A kind of method, apparatus and device of leak reparation

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404281A (en) * 2010-09-09 2012-04-04 北京神州绿盟信息安全科技股份有限公司 Website scanning device and method
US20130133044A1 (en) * 2011-11-18 2013-05-23 Lockheed Martin Corporation Self-propelled harvesting vehicle including a thermochemical reactor for carbonizing harvested crop material
CN104065645A (en) * 2014-05-28 2014-09-24 北京知道创宇信息技术有限公司 Web vulnerability protection method and apparatus
CN105468981A (en) * 2015-11-20 2016-04-06 上海斐讯数据通信技术有限公司 Vulnerability identification technology-based plugin safety scanning device and scanning method
CN106649429A (en) * 2016-08-25 2017-05-10 北京知道未来信息技术有限公司 Method and device for rapidly evaluating vulnerability hazard level based on multi-dimensional statistics
CN106570403A (en) * 2016-11-02 2017-04-19 北京知道未来信息技术有限公司 Loophole harm degree identification method based on risk model
CN107480533A (en) * 2017-08-08 2017-12-15 深圳市腾讯计算机系统有限公司 A kind of method, apparatus and device of leak reparation

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109062638A (en) * 2018-06-15 2018-12-21 平安科技(深圳)有限公司 A kind of system component display methods, computer readable storage medium and terminal device
CN109062638B (en) * 2018-06-15 2021-09-17 平安科技(深圳)有限公司 System component display method, computer readable storage medium and terminal device
CN109361707A (en) * 2018-12-13 2019-02-19 北京知道创宇信息技术有限公司 A kind of batch query method, apparatus, server and storage medium
CN109361707B (en) * 2018-12-13 2021-07-13 北京知道创宇信息技术股份有限公司 Batch query method, device, server and storage medium
CN110110527A (en) * 2019-05-10 2019-08-09 重庆八戒电子商务有限公司 A kind of discovery method of loophole component, discovery device, computer installation and storage medium
CN114024691A (en) * 2020-07-15 2022-02-08 腾讯科技(深圳)有限公司 Vulnerability information processing method, device, equipment and medium based on cloud security
CN114024691B (en) * 2020-07-15 2023-11-03 腾讯科技(深圳)有限公司 Vulnerability information processing method, device, equipment and medium based on cloud security
CN111967020A (en) * 2020-08-19 2020-11-20 中国银行股份有限公司 System security vulnerability scanning device and method
CN111967020B (en) * 2020-08-19 2024-02-23 中国银行股份有限公司 System security hole scanning device and method
CN115118498A (en) * 2022-06-28 2022-09-27 北京中科微澜科技有限公司 Vulnerability data analysis method and system based on relevance
CN115118498B (en) * 2022-06-28 2023-11-28 北京中科微澜科技有限公司 Vulnerability data analysis method and system based on relevance

Also Published As

Publication number Publication date
CN108154034B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN108154034A (en) Leak analysis method and device based on WordPress
Gamba et al. An analysis of pre-installed android software
US11792229B2 (en) AI-driven defensive cybersecurity strategy analysis and recommendation system
US11750659B2 (en) Cybersecurity profiling and rating using active and passive external reconnaissance
US11019114B2 (en) Method and system for application security evaluation
US20220210200A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
US20220224723A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
US20190363893A1 (en) Evaluating authenticity of applications based on assessing user device context for increased security
US20220201042A1 (en) Ai-driven defensive penetration test analysis and recommendation system
US20210021644A1 (en) Advanced cybersecurity threat mitigation using software supply chain analysis
US20130254880A1 (en) System and method for crowdsourcing of mobile application reputations
US20150180908A1 (en) System and method for whitelisting applications in a mobile network environment
US20130097659A1 (en) System and method for whitelisting applications in a mobile network environment
CN102739653B (en) Detection method and device aiming at webpage address
CN103607385A (en) Method and apparatus for security detection based on browser
CN110598411A (en) Sensitive information detection method and device, storage medium and computer equipment
US20220014561A1 (en) System and methods for automated internet-scale web application vulnerability scanning and enhanced security profiling
GB2507357A (en) Implementing an Agent-based Application Reputation Security System
CN113489713A (en) Network attack detection method, device, equipment and storage medium
WO2021216163A2 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
CN104640105A (en) Method and system for mobile phone virus analyzing and threat associating
CN103235918B (en) The collection method of trusted file and system
CN104717226A (en) Method and device for detecting website address
CN106302519A (en) The method of a kind of internet security management and terminal
CN110830321A (en) Website detection scheduling method and device, storage medium and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: Room 803, Jinwei Building, 55 Lanindichang South Road, Haidian District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant