btoplak / Joomla-Anti-Malware-Scan-Script--JAMSS-

a Joomla! and WordPress Security script that automatically scans the Joomla! or Wordpress files for some patterns and "fingerprints" of malware, trojans or other injections into PHP code
146 stars 102 forks source link

.gif file that starts straight with '<?php' instead of 'GIF89a.' #13

Open peterpeter opened 8 years ago

peterpeter commented 8 years ago

Hi A collegue discovered two manipulatetd gif files in his (Joomla-) template image folder, that starts straight with <?php instead of the used jamss-pattern GIF89a.*[\r\n]*.*<\?php followed by plain php-code (no eval/gzip/base64_encode.....)

As the patterns are file-extension indepent, and this is the future format of manipulatet gif's, that could be faced by adding a additional 'include/exclude file-extension' entry/entries in the patterns arrays, that can be used as an additional condition in the scan_file() function.