whoami7 - Manager
:
/
home
/
papecmvm
/
Upload File:
files >> /home/papecmvm/scanreport-papecmvm-2023-04-14T12:13:52.541439.txt
----------- SCAN REPORT ----------- TimeStamp: Fri, 14 Apr 2023 08:13:53 -0400 (/usr/sbin/cxs --clamdsock /var/clamd --dbreport --defapache nobody --doptions Mv --exploitscan --nofallback --filemax 50000 --noforce --html --ignore /etc/cxs/cxs.ignore.manual --options mMOLfSGchexdnwZDRru --noprobability --qoptions Mv --report /home/papecmvm/scanreport-papecmvm-2023-04-14T12:13:52.541439.txt --sizemax 1000000 --ssl --summary --sversionscan --timemax 30 --unofficial --user papecmvm --virusscan --vmrssmax 2000000 --xtra /etc/cxs/cxs.xtra.manual) Scanning /home/papecmvm: '/home/papecmvm/access-logs' # Symlink to [/etc/apache2/logs/domlogs/papecmvm] '/home/papecmvm/.nc_plugin/hidden' # World writeable directory '/home/papecmvm/logs/paperpush.com-ssl_log.bkup' # Symlink to [/etc/apache2/logs/domlogs/paperpush.com-ssl_log.bkup] '/home/papecmvm/logs/paperpush.com.bkup' # Symlink to [/etc/apache2/logs/domlogs/paperpush.com.bkup] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ApiGatewayManagementApi/ApiGatewayManagementApiClient.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ApiGatewayManagementApi/Exception/ApiGatewayManagementApiException.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ApiGatewayV2/ApiGatewayV2Client.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ApiGatewayV2/Exception/ApiGatewayV2Exception.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ServerlessApplicationRepository/ServerlessApplicationRepositoryClient.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/application/third_party/aws/aws/aws-sdk-php/src/ServerlessApplicationRepository/Exception/ServerlessApplicationRepositoryException.php' # Regular expression match = [\*[A-Za-z0-9]{12,130}\*] '/home/papecmvm/public_html/bootstrap/fonts/fonts/ZygDdVlEJAzqxINfbGU.gif' # Suspicious image file (hidden script file) '/home/papecmvm/public_html/plugins/input-mask/phone-codes/phone-codes.php' # Universal decode regex match = [universal decoder] # (decoded file [advanced decoder: 14 (depth: 1)]) Known exploit = [Fingerprint Match] [PHP Exploit [P1900]] ----------- SCAN SUMMARY ----------- Scanned directories: 4351 Scanned files: 8533 Ignored items: 63 Suspicious matches: 13 Viruses found: 0 Fingerprint matches: 1 Data scanned: 149.75 MB Scan peak memory: 261848 kB Scan time/item: 0.028 sec Scan time: 355.233 sec
Copyright ©2021 || Defacer Indonesia