New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cPanel 11.52.2.4 found "malicious" strings at /inc/ZipLib.class.php #1516
Comments
This is the file you mentioned: https://github.com/splitbrain/dokuwiki/blob/master/inc/ZipLib.class.php Are you sure you have still the original files on the server? (don't compare dates, but compare the files with a new downloaded version) |
Is there anything that has to be checked from the our side? |
You are sure that your If the code is equal to our code, could you ask the support team that sent you this message if they can tell which part of the code is triggering this warning in the scan? |
I have seen this same error from hosting sites that scan files with SiteLock:
(The suffix after By its name it seems like it would have something to do with https://www.owasp.org/index.php/Direct_Dynamic_Code_Evaluation_('Eval_Injection') It seems clear that it is a false positive, either from the strings of hex/binary data - or else from having the https://blog.sitelock.com/2012/08/how-to-find-injected-malware-in-a-wordpress-website/ |
I understood that it is a false positive. Anyway, the root of the message seems to be the ZipLib. As it will be removed from DokuWiki with the next release "Frusterick Manners" maybe this issue can be closed? |
cPanel 11.52.2.4 found "malicious" strings at /inc/ZipLib.class.php
For DokuWiki 2015-08-10a "Detritus" & 2016-04-02 "snapshot".
PHP-EVAL_REQUEST-augq.UNOFFICIAL FOUND
cPanel block outbound ports 80, 443, 587 and 465 for all accounts hosting DokuWiki.
No more info.
The text was updated successfully, but these errors were encountered: