Hello, I recently bought SEO helper from Jo Workman, and I am extremely happy with it, the problem is when I use it on a website, my hosting provider send me a warning of virus in in the site; when i look at it, I find the file detected as malicious is in /rw_common/plugins/stacks/serverdebug.php
here is the content of the file:
Server Debug Info
You are running an unsupported version of PHP. You must be running PHP v7.2+. Your version: '.PHP_VERSION."
"; } $header = get_all_the_headers(); if (count($header) === 0) { echo 'Unable to process server request headers.
'; } // Image support check if (!extension_loaded('gd')) { echo "You do not have the PHP gd extension enabled
"; } // curl support check if (!extension_loaded('curl')) { echo "curl extension is not enabled on this server.
"; } // EXIF Check if (!function_exists('exif_read_data')) { echo "The exif_read_data() function is not installed.
"; } // lib dir $asset_dir = __DIR__; if (!is_writable($asset_dir)) { chmod($cms_dir, 0775); if (!is_writable($asset_dir)) { echo "The lib directory is not writable. Please fix the permissions on the directory: $asset_dir
"; } } ?>PHP version: '. phpversion() .'
'; echo 'LOCALE: '. setlocale(LC_ALL, 0) .'
'; echo 'HTTP_HOST: '. $_SERVER['HTTP_HOST'] .'
'; echo 'SERVER_NAME: '. $_SERVER['SERVER_NAME'] .'
'; echo 'DOCUMENT_ROOT: '. $_SERVER['DOCUMENT_ROOT'] .'
'; echo 'DOCUMENT_ROOT (realpath): '. realpath($_SERVER['DOCUMENT_ROOT']) .'
'; echo 'SITE ROOT: '. preg_replace('/(.*).rw_common.+/', '$1', __DIR__) .'
'; if (isset($_SERVER['SUBDOMAIN_DOCUMENT_ROOT']) && is_dir($_SERVER['SUBDOMAIN_DOCUMENT_ROOT'])) { echo 'SUBDOMAIN_DOCUMENT_ROOT (GoDaddy?): '.$_SERVER['SUBDOMAIN_DOCUMENT_ROOT'].'
'; } if (isset($_SERVER['PHPRC']) && is_dir($_SERVER['PHPRC'])) { echo 'PHPRC: '.$_SERVER['PHPRC'].'
'; } // LiteSpeed server hack. SCRIPT_NAME on shared hosting contains domain name // This was on A2 hosting. Strip the domain out echo 'SCRIPT_NAME: '. $_SERVER['SCRIPT_NAME'] .'
'; echo 'POST_MAX_SIZE: '.ini_get('post_max_size').'
'; echo 'UPLOAD_MAX_FILESIZE: '.ini_get('upload_max_filesize').'
'; echo 'MEMORY LIMIT: '.ini_get('memory_limit').'
'; echo 'MAX_EXECUTION_TIME: '.ini_get('max_execution_time').'
'; ?><?php if (isset($_GET['info'])) phpinfo(); } ?>
there must be t in the code that make the antivirus software from Haisoft believe this file is malicious, has anybody come across anything like this?
PJ