From 97564364b082aace0adcf306446bdff97f539ed2 Mon Sep 17 00:00:00 2001 From: Julien (jvoisin) Voisin Date: Wed, 24 Feb 2016 10:26:05 +0100 Subject: Even more tests for the testsuite! --- php-malware-finder/malwares.yara | 21 +++++++++++---------- php-malware-finder/samples/artificial/dodgy.php | 18 ++++++++++++++++++ php-malware-finder/tests.sh | 25 ++++++++++++++++++++----- 3 files changed, 49 insertions(+), 15 deletions(-) create mode 100644 php-malware-finder/samples/artificial/dodgy.php diff --git a/php-malware-finder/malwares.yara b/php-malware-finder/malwares.yara index 8fe7b15..bfc4d7a 100644 --- a/php-malware-finder/malwares.yara +++ b/php-malware-finder/malwares.yara @@ -108,14 +108,12 @@ rule DodgyPhp $execution = /(eval|assert|passthru|exec|system|win_shell_execute|base64_decode)\s*\(\s*(base64_decode|php:\/\/input|str_rot13|gz(inflate|uncompress)|getenv|pack|\\?\$_(GET|REQUEST|POST|COOKIE))/ $htaccess = "SetHandler application/x-httpd-php" $iis_com = /IIS:\/\/localhost\/w3svc/ - $include = /include\([^\.]+\.(png|jpg|gif|bmp)/ // Clever includes - $ini_get = /ini_get\(['"](safe_mode|open_basedir|disable_function|safe_mode_exec_dir|safe_mode_include_dir|register_globals)['"]\)/ - $iniset_urlinclude = /ini_set\('allow_url_include,\ * 1'\)/ - $pr = /(preg_replace(_callback)?|mb_ereg_replace|preg_filter)\s*\(['"]\/[^\/]*\/e['"]/ // http://php.net/manual/en/function.preg-replace.php - $restore_bypass = /ini_restore\(['"](safe_mode|open_basedir|disable_function|safe_mode_exec_dir|safe_mode_include_dir|register_globals)['"]\)/ + $include = /include\s*\(\s*[^\.]+\.(png|jpg|gif|bmp)/ // Clever includes + $ini_get = /ini_(get|set|restore)\s*\(\s*['"](safe_mode|open_basedir|disable_function|safe_mode_exec_dir|safe_mode_include_dir|register_globals|allow_url_include)/ + $pr = /(preg_replace(_callback)?|mb_ereg_replace|preg_filter)\s*\(\s*['"]\/[^\/]*\/e/ // http://php.net/manual/en/function.preg-replace.php $safemode_bypass = /\x00\/\.\.\/|LD_PRELOAD/ - $shellshock = /putenv\(["']PHP_[^=]=\(\) { [^}] };/ - $udp_dos = /sockopen\s*\(['"]udp:\/\// + $shellshock = /\(\)\s*{\s*:\s*;\s*}\s*;/ + $udp_dos = /fsockopen\s*\(\s*['"]udp:\/\// $user_function = /(call_user_func|create_function)/ $various = "