phpMussel / phpMussel

PHP-based anti-virus anti-trojan anti-malware solution.
https://phpmussel.github.io/
GNU General Public License v2.0
421 stars 80 forks source link

PHP chameleon attack detected! #243

Open gorai-sunil opened 2 weeks ago

gorai-sunil commented 2 weeks ago

I have converted a .wav file into an mp3 file. When this mp3 file is scanned through phpmussel it PHP chameleon attack is detected! And if I add mp3 value in can_contain_php_file_extensions from phpmussel.ini it works fine. But surprisingly when I checked with another sample.wav file and converted it into m3 it worked without any changes. So can I know the reason why my first file is not working without any changes in phpmussel.ini settings?

Maikuolan commented 2 weeks ago

To be triggering PHP chameleon attack detection, the data resulting from processing the content of a file with phpMussel's "normalise" method (so, the content of the file minus any bytes outside the \x21-\x7E range, minus any HTML or HTML-like tags, and lowercased) must contain <?php somewhere. I'll see whether I'm able to tweak the code a little to help reduce these kinds of false positives.

gorai-sunil commented 2 weeks ago

@Maikuolan Thanks for this information.