GOTMLS flagging it’s own firewall rules as a backdoor script
-
Around a week ago Wordfence started flagging up a file in my W3TC object cache as having ‘Suspicious eval with base64 decode..’, scans with GOTMLS also flag the files as being a backdoor script – the files look suspicious as they make reference in plaintext to viagra and cialis (see below). After some investigation it transpires that both GOTMLS and Wordfence are flagging a cached version of the wp_options table as suspicious and the concerning text is actually GOTMLS OWN FIREWALL RULES!
keyspat viagra cialis";a:2:{i:0;s:5:"D1ON3";i:1;s:120:"/error_reporting\(0\);[ \t\r\n]+\$keyspat[= \t]+array\([ \t\r\n]*(['"](viagra|amoxicillin|cialis)['"][ \t\r\n,]+){2}.+/s";}s:18:"eval REQUEST alone";a:2:{i:0;s:5:"F4PLP";i:1;s:162:"/<\?[ph\s]+((\$[a-z\_0-9]+)\s*=\s*\$
Please do something about this – at the very least make a post on a website about it – I spent the weekend hunting for an infection in 33 websites that actually turned out to be my own anti-malware solution detecting itself.
- The topic ‘GOTMLS flagging it’s own firewall rules as a backdoor script’ is closed to new replies.