Exploit Scanner v1.11

3 posts by 2 authors in: Forums > CMS Builder
Last Post: June 15, 2015   (RSS)

Hi

Exploit Scanner has picked up the following potential exploit on one of my systems:

/home/xxxxxx/public_html/list/admin/connect.php (Score: 12) 
 - PHP Code Match (Score 1): Base64 string of 100+ chars (matched string: $oldpoweredimage = 'iVBORw0KGgoAAAANSUhEUgAAAFgAAAAfCAMAAABUFvrSAAAABGdBTUEAALGPC/xhBQAAAMBQTFRFmQAA...) 
 - PHP Code Match (Score 10): Base64 string of 1000+ chars (matched string: $oldpoweredimage = 'iVBORw0KGgoAAAANSUhEUgAAAFgAAAAfCAMAAABUFvrSAAAABGdBTUEAALGPC/xhBQAAAMBQTFRFmQAA...) 
 - PHP Code Match (Score 1): PHP disabling error_reporting (matched string: error_reporting(0))

Scanned: 582 dirs, 10,593 files (3 risks found)Execute time: 0 minutes, 42 seconds 

I understand the 1st two messages, but I don't understand the 3rd one.  Is some code actually disabling error reporting?  It would be nice if exploit scanner would list the line number of the potential exploit!

Ragi

--
northernpenguin
Northern Penguin Technologies

"Any sufficiently advanced technology
is indistinguishable from magic."
........Arthur C. Clarke

Thanks Dave.  You are right, the coders turned off error reporting for some reason.  I have to look at it in more detail to figure out why, but I suspect lazy coding!

Ragi

--
northernpenguin
Northern Penguin Technologies

"Any sufficiently advanced technology
is indistinguishable from magic."
........Arthur C. Clarke