HEX
Server: Apache
System: Linux localhost.localdomain 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
User: web57 (5040)
PHP: 7.4.33
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Upload Files
File: /var/www/clients/client6/web57/web/wffence/wp-cli-wordfence/tests/ScannerTest.php
<?php

use GeneroWP\WpCliWordfence\Models\Record;
use GeneroWP\WpCliWordfence\VulnerabilityException;
use GeneroWP\WpCliWordfence\VulnerabilityScanner;
use GeneroWP\WpCliWordfence\WordfenceApi;
use PHPUnit\Framework\TestCase;

class ScannerTest extends TestCase
{
    public VulnerabilityScanner $scanner;

    protected function setUp(): void
    {
        parent::setUp();

        $this->scanner = new VulnerabilityScanner(
            new WordfenceApi()
        );

        wp_cache_set('plugins', [
            '' => [
                'opening-hours/opening-hours.php' => [
                    'Version' => '1.3',
                ],
            ]
        ], 'plugins');
    }

    public function testFixedVersion()
    {
        $record = $vulnerability = null;
        foreach ($this->scanner->next() as $record => $vulnerability) {
            if ($record->id === '0004db27-9ea6-4387-ab1d-b95558784ed9') {
                break;
            }
        }

        $this->assertInstanceOf(Record::class, $record);
        $this->assertJsonStringEqualsJsonFile(__DIR__ . '/fixtures/opening-hours-vulnerability.json', json_encode($record));

        $this->assertInstanceOf(VulnerabilityException::class, $vulnerability);
        $this->assertEquals('* < 1.3 < 1.37', $vulnerability->getMessage());
    }
}