Report

Version: 0.10.4
Scan date: 2023-11-24 21:02:43
Files analyzed: 35469 | Files infected: 567

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax-master/main/lang/la/template.php

Size: 8.41 kB Created: 2023-10-19 12:12:54 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.basket.basket/wishlist/template.php

Size: 2.47 kB Created: 2023-10-19 12:09:43 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 58 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delayed.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.basket.basket/basketnew/template.php

Size: 3.89 kB Created: 2023-10-19 12:09:39 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 70 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolder "/basket_items.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/main/lang/la/template.php

Size: 8.41 kB Created: 2023-10-19 12:13:59 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/ord3/templates/.default/props.php

Size: 5.08 kB Created: 2023-10-19 12:13:29 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/ord3/templates/.default/template.php

Size: 6.99 kB Created: 2023-10-19 12:13:29 Modified: 2023-11-24 17:24:47 Dangers: 8
DescriptionMatch

Exploit execution Line: 206 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 207 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 210 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 219 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 221 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 74 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 82 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/ord3/templates/.default/related_props.php

Size: 471.00 B Created: 2023-10-19 12:13:27 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/order/props.php

Size: 5.08 kB Created: 2023-10-19 12:08:47 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/order/related_props.php

Size: 471.00 B Created: 2023-10-19 12:08:44 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/order_2/props.php

Size: 5.08 kB Created: 2023-10-19 12:09:04 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/order_2/related_props.php

Size: 471.00 B Created: 2023-10-19 12:09:01 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/sale.order.ajax/defs/lang/la/template.php

Size: 8.41 kB Created: 2023-10-19 12:14:11 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/new/components/bitrix/catalog/catalog/section.php

Size: 2.44 kB Created: 2023-10-19 12:07:29 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax-master/main/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.basket.basket/wishlist/template.php

Size: 2.47 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 58 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delayed.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.basket.basket/basketnew/template.php

Size: 3.89 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 70 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolder "/basket_items.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/main/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/ord3/templates/.default/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/ord3/templates/.default/template.php

Size: 6.99 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 8
DescriptionMatch

Exploit execution Line: 206 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 207 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 210 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 219 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 221 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 74 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 82 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/ord3/templates/.default/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/order/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/order/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/order_2/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/order_2/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/sale.order.ajax/defs/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma/components/bitrix/catalog/catalog/section.php

Size: 2.44 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax-master/main/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.basket.basket/wishlist/template.php

Size: 2.47 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 58 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delayed.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.basket.basket/basketnew/template.php

Size: 3.67 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 65 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolder "/basket_items.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/main/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/ord3/templates/.default/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/ord3/templates/.default/template.php

Size: 6.99 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 8
DescriptionMatch

Exploit execution Line: 206 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 207 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 210 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 219 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 221 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 74 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 82 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/ord3/templates/.default/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/order/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/order/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/order_2/props.php

Size: 5.08 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/order_2/related_props.php

Size: 471.00 B Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/sale.order.ajax/defs/lang/la/template.php

Size: 8.41 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/local/templates/laroma_copy/components/bitrix/catalog/catalog/section.php

Size: 2.44 kB Created: 2023-02-22 17:07:58 Modified: 2023-11-24 17:24:47 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/qrcdr/translations/es.php

Size: 4.03 kB Created: 2020-09-12 20:21:26 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 91 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/cache/30/wp-config-samples.php

Size: 3.78 kB Created: 2023-11-23 04:30:26 Modified: 2023-11-24 17:24:48 Warns: 2 Dangers: 4
DescriptionMatch

Exploit double_var2 Line: 37 Warning

Double var technique is usually used for the obfuscation of malicious code

${$wyeeuqehxtz}

Exploit hex_char Line: 37 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval("?\76" . ${$GLOBALS["fcgthfemb"]})

Function eval Line: 37 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\x3f\76" . ${$GLOBALS["\x66\143\147\x74\x68\x66\x65\155\142"]})

Sign 8f25a7cb Line: 15 Dangerous

Malware Signature (hash: 8f25a7cb)

if (md5($_POST[

Sign 963e968a Line: 37 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/home/pizzalaroma.kz/public_html/bitrix/cache/iblock_find/66/66c384910ba9a23f9610e04a12ff8e19.php

Size: 328.00 B Created: 2023-11-21 20:10:17 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/pizzalaroma.kz/public_html/bitrix/cache/iblock_find/79/7970a8201e1f469b337e28658709030e.php

Size: 357.00 B Created: 2023-11-21 14:14:14 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/pizzalaroma.kz/public_html/bitrix/cache/iblock_find/e9/e93613d9881bcdfb1088a0f9dd422826.php

Size: 337.00 B Created: 2023-11-21 14:14:18 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/pizzalaroma.kz/public_html/bitrix/cache/iblock_find/9d/9d1fcead0869efed10e0d6220af02938.php

Size: 329.00 B Created: 2023-11-21 14:13:59 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/pizzalaroma.kz/public_html/bitrix/cache/iblock_find/6a/6ae175e6482b788d9dce79118872aad9.php

Size: 348.00 B Created: 2023-11-21 17:46:38 Modified: 2023-11-24 17:24:48 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 5 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/pizzalaroma.kz/public_html/bitrix/cache/1f/themes.php

Size: 179.86 kB Created: 2023-11-23 04:30:26 Modified: 2023-11-24 17:24:48 Warns: 3 Dangers: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('echo EXEC') == 'EXEC'); } if ($exec_works) { $arg escapeshellarg($file); $cmd = ($iswin) ? "for %F in (\"$file\") do @echo %~zF" : ($isdarwin "stat -f%z $arg"stat -c%s $arg"); @exec($cmd$output); if (is_array($output) && ctype_digit($size trim(implode("\n"$output)))) { return $size; } } if ($iswin && class_exists("COM")) { try { $fsobj = new COM('Scripting.FileSystemObject'); $f $fsobj->GetFilerealpath($file) ); $size $f->Size; } catch (Exception $e) { $size null; } i...

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid(fileowner($path '/' $f)); $group posix_getgrgid(filegroup($path '/' $f)); } else { $owner = array('name' => '?'); $group = array('name' => '?'); } ?>
                <tr>
                    if (!FM_READONLY): ?>
                        <td class="custom-checkbox-td">
                        <div class="custom-control custom-checkbox">
                            <input type="checkbox" class="custom-control-input" id="echo $ii ?>" name="file[]" value="<?...

Function shell_exec Warning

Potentially dangerous function `shell_exec`

[https://www.php.net/shell_exec]

shell_exec('file -bi ' $file); return $mime; } else { return '--'; } } function fm_redirect($url$code 302) { header('Location: ' $urltrue$code); exit; } function get_absolute_path($path) { $path str_replace(array('/''\\'), DIRECTORY_SEPARATOR$path); $parts array_filter(explode(DIRECTORY_SEPARATOR$path), 'strlen'); $absolutes = array(); foreach ($parts as $part) { if ('.' == $part) continue; if ('..' == $part) { array_pop($absolutes); } else { $absolutes[] = $part; } } retur...

Sign 664602fe Line: 420 Dangerous

Malware Signature (hash: 664602fe)

fm_redirect(FM_SELF_URL '?p=' urlencode(FM_PATH));

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/report.view/templates/admin/template.php

Size: 54.95 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.location.import/templates/admin/template.php

Size: 13.08 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.filter/component.php

Size: 33.07 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 70 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

Exploit double_var2 Line: 73 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PREFILTER_NAME}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.smart.filter/component.php

Size: 29.42 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 23 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PREFILTER_NAME}

Exploit double_var2 Line: 578 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/template.php

Size: 31.88 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:49 Dangers: 3
DescriptionMatch

Exploit execution Line: 185 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function eval Line: 204 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/report.construct/templates/.default/template.php

Size: 40.31 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/report.construct/templates/admin/template.php

Size: 40.04 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.edit/templates/.default/template.php

Size: 21.58 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 242 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.edit/templates/micro/template.php

Size: 4.46 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.bsm.site.master/tools/modulechecker.php

Size: 3.04 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 119 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.bsm.site.master/tools/pushchecker.php

Size: 2.20 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 114 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/forum.topic.active/component.php

Size: 18.38 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 11 Warning

Double var technique is usually used for the obfuscation of malicious code

${$s}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.comment.list/templates/.default/template.php

Size: 3.61 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 8 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.interface.grid/component.php

Size: 9.39 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);'); uasort($aOptions["views"], $func); $arResult["OPTIONS"] = $aOptions$arResult["GLOBAL_OPTIONS"] = CUserOptions::GetOption("main.interface""global", array(), 0); if($arParams["USE_THEMES"]) { if($arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID] <> ''$arResult["GLOBAL_OPTIONS"]["theme"] = $arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID]; if($arResult["OPTIONS"]["theme"] == ''$arResult["OPTIONS"...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.32 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:49 Warns: 1
DescriptionMatch

Function eval Line: 338 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.crm.site.master/tools/modulechecker.php

Size: 5.10 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 139 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.crm.site.master/tools/pushchecker.php

Size: 2.20 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 114 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/form.result.list/component.php

Size: 18.44 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function create_function Line: 108 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=trim(\$item);"));
        
TrimArr($arParams["arrNOT_SHOW_FILTER"]);

    else 
$arParams["arrNOT_SHOW_FILTER"]=array();

    if (
is_array($arParams["NOT_SHOW_TABLE"]))
    {
        
$arParams["arrNOT_SHOW_TABLE"] = $arParams["NOT_SHOW_TABLE"];
    }
    else
    {
        
$arParams["arrNOT_SHOW_TABLE"] = explode(",",$arParams["NOT_SHOW_TABLE"]);
    }
    if (
is_array($arParams["arrNOT_SHOW_TABLE"])) //array_walk($arParams["arrNOT_SHOW_TABLE"], create_function("&\$item", "\$item=trim(\$item);"));
        
Trim...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.link.list/component.php

Size: 1.14 kB Created: 2023-02-22 17:08:04 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 19 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FN}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/rss.show/component.php

Size: 2.59 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function create_function Line: 73 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$val, $key''$val=htmlspecialcharsex($val);'));
    elseif(
$arParams["PROCESS"] == "TEXT")
        
array_walk_recursive($arResultcreate_function('&$val, $key''$val=str_replace(array("    ", "\\r\\n"), array("&nbsp;&nbsp;&nbsp;&nbsp;", "<br>"), HTMLToTxt($val));'));

    
$this->IncludeComponentTemplate()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/forum.topic.list/component.php

Size: 23.88 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 244 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/photogallery/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 30.03 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.popular_blogs/component.php

Size: 5.77 kB Created: 2023-02-22 17:08:04 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function create_function Line: 100 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["VIEWS"] == $b["VIEWS"]) { if($a["NUM_COMMENTS"] < $b["NUM_COMMENTS"]) return 1; elseif($a["NUM_COMMENTS"] > $b["NUM_COMMENTS"]) return -1; else return 0;} return ($a["VIEWS"] < $b["VIEWS"])? 1 : -1;'));

        
$i 0;
        foreach(
$arBlogs as $blogID => $info)
        {
            if(
$i >= $arParams["BLOG_COUNT"] && IntVal($arParams["BLOG_COUNT"]) > 0)
                continue;
            
$arBlog CBlog::GetByID($blogID);
            
$arBlog CBlogTools::htmlspecialcharsExArray($arBlog);
            
$arBlog["BlogUser"...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.46 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function eval Line: 224 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }
            if (
result['status'] == 'inprogress')
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text'];
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true;
                }
                else
                {
                    
document.getElementById(...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/b24connector.button.list/ajax.php

Size: 3.73 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/forum.index/component.php

Size: 18.80 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 111 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 43.87 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arParams.MESSAGES = messages;

            if (action !== 'more')
            {
                Grid.arPar...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.comment/templates/.default/template.php

Size: 30.17 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:50 Dangers: 3
DescriptionMatch

Exploit execution Line: 134 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 23 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php

Size: 15.25 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function eval Line: 210 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.mail.form/templates/.default/template.php

Size: 20.09 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit nano Line: 287 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$field['render']($field)

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog/templates/.default/section.php

Size: 2.44 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog/templates/bootstrap_v4/section.php

Size: 2.46 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 74 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.sections.top/component.php

Size: 17.96 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.43 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.user.link/component.php

Size: 19.51 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 445 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$folderPath."/card.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.map/component.php

Size: 5.85 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:50 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 157 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$full_path.".section.php")

Function eval Line: 87 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";")))
                                continue;
                        }

                        
$search_child false;
                        
$search_path '';
                        
$full_path '';
                        if (
$aMenu[1] <> '')
                        {
                            if(
preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1]))
                            {
                                
$full_path $aMenu[1];
                            }
                            else
                            {
                                
$full_path trim(Rel2Abs(substr($PARENT_PATHstrlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1]));

                                
$slash_pos strrpos($full_path"/");
                                if (
$slash_pos !== f...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:51 Warns: 1
DescriptionMatch

Function exec Line: 186 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.numerator.edit/templates/admin/template.php

Size: 312.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.67 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:51 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 110 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 18.87 kB Created: 2023-02-22 17:08:01 Modified: 2023-11-24 17:24:51 Dangers: 2
DescriptionMatch

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.99 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:51 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/main.post.form/templates/.default/template.php

Size: 14.35 kB Created: 2023-02-22 17:08:02 Modified: 2023-11-24 17:24:51 Dangers: 3
DescriptionMatch

Exploit execution Line: 124 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/file.php")

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/urlpreview.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.edit/.default/template.php

Size: 25.44 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.comment/.default/template.php

Size: 21.68 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/template.php

Size: 23.87 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/template.php

Size: 21.46 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:51 Warns: 1
DescriptionMatch

Function eval Line: 89 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/sender.message.editor/templates/.default/template.php

Size: 9.66 kB Created: 2023-02-22 17:08:00 Modified: 2023-11-24 17:24:52 Dangers: 1
DescriptionMatch

Exploit nano Line: 154 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$option['view']()

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.element/templates/.default/template.php

Size: 65.43 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:52 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1115 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/home/pizzalaroma.kz/public_html/bitrix/components/bitrix/catalog.element/templates/bootstrap_v4/template.php

Size: 65.38 kB Created: 2023-02-22 17:08:06 Modified: 2023-11-24 17:24:52 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1142 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                            '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                            '
BASKET_URL' => $arParams['BASKET_URL'],
                            '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                            '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                            '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                            '
USE_PRODUCT_QUANTITY' => 'N',
                            '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'],
                ...

/home/pizzalaroma.kz/public_html/bitrix/index.php

Size: 83.00 B Created: 2023-02-22 17:08:39 Modified: 2023-11-24 17:24:52 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/home/pizzalaroma.kz/public_html/bitrix/wizards/bitrix/demo/scripts/template.php

Size: 15.72 kB Created: 2023-02-22 17:08:41 Modified: 2023-11-24 17:24:52 Warns: 1
DescriptionMatch

Function eval Line: 462 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(response);
            }

            
CAjaxForm.prototype.ShowError = function(errorMessage)
            {
                var 
errorContainer document.getElementById("error_container");
                var 
errorText document.getElementById("error_text");
                if (!
errorContainer || !errorText)
                    return;

                var 
waitWindow document.getElementById("wait");
                if (
waitWindow)
                    
waitWindow.style.display "none";

                
errorContainer.style.display 'block';
                
errorText.innerHTML strip_tags(errorMessage);

                var 
retryButton = ...

/home/pizzalaroma.kz/public_html/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download.php

Size: 2.09 kB Created: 2023-02-22 17:08:40 Modified: 2023-11-24 17:24:52 Dangers: 2
DescriptionMatch

Exploit execution Line: 36 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_before.php")

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/home/pizzalaroma.kz/public_html/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download_balance.php

Size: 3.00 kB Created: 2023-02-22 17:08:40 Modified: 2023-11-24 17:24:52 Dangers: 2
DescriptionMatch

Exploit execution Line: 47 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_before.php")

Exploit execution Line: 95 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/home/pizzalaroma.kz/public_html/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download_private/download_private.php

Size: 3.71 kB Created: 2023-02-22 17:08:40 Modified: 2023-11-24 17:24:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 127 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin_tools.php

Size: 24.16 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 3
DescriptionMatch

Exploit execution Line: 180 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$root.$init."/.description.php")

Exploit execution Line: 232 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path_mod."/".$file_templ."/.description.php")

Exploit execution Line: 266 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path."/".$folder_name."/.description.php")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$v1,$v2','if ($v1>$v2) return 1; elseif ($v1<$v2) return -1;')); return $arrTemplate; } } class CTemplates { public static function GetList($arFilter = array(), $arCurrentValues = array(), $template_id = array()) { if(!is_set($arFilter"FOLDER")) { $arr CTemplates::GetFolderList(); $arFilter["FOLDER"] = array_keys($arr); } $arTemplates = array(); foreach($arFilter["FOLDER"] as $folder) { $folder _normalizePath($folder); $arTemplates[$folder] = array(); $arPath = array( "/bi...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/tools/upload.php

Size: 984.00 B Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

exec($_REQUEST["mode"], array("width" => $_REQUEST["width"], "height" => $_REQUEST["height"])

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/lang_files.php

Size: 3.49 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 72 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$NEW_LANGS[$i])

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/prolog_auth_admin.php

Size: 3.22 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 66 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/epilog_main_admin.php

Size: 4.18 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 47 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteSupport)

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/admin_lib.php

Size: 69.95 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 716 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/admin/.left.menu.php")

Function create_function Line: 2515 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcasecmp($a["ID"], $b["ID"]);'));
        return 
$aThemes;
    }

    public static function 
GetCurrentTheme()
    {
        
$aUserOpt CUserOptions::GetOption("global""settings");
        if(
$aUserOpt["theme_id"] <> "")
        {
            
$theme preg_replace("/[^a-z0-9_.-]/i"""$aUserOpt["theme_id"]);
            if(
$theme <> "")
            {
                return 
$theme;
            }
        }

        return 
".default";
    }
}

class 
CAdminUtil
{
    public static function 
dumpVars($vars$arExclusions = array())
    {
        
$result "";
        if (
i...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/epilog_auth_admin.php

Size: 1.56 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 7 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/epilog_jspopup_admin.php

Size: 221.00 B Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/auth/wrapper.php

Size: 5.87 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 128 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteSupport)

Exploit execution Line: 68 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/interface/auth/wrapper_auth_result.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/admin_list.php

Size: 41.25 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 918 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.form.action[this.form.action.selectedIndex].getAttribute('custom_action'));return false;}" disabled="disabled" class="adm-table-action-button" />
<?
            endif; //(strlen(
$list) > 0)
?>
    <span class="
adm-table-counter" id="<?=$this->table_id?>_selected_count"><?=GetMessage('admin_lib_checked')?>: <span>0</span></span>
<?
        endif; // ($this->bEditMode || count($this->arUpdateErrorIDs)>0):
?>
</div>
<?
    }

    public function DisplayList($arParams = array())
    {
        $menu = new CAdminPopup($this...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/interface/prolog_main_admin.php

Size: 17.72 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 3
DescriptionMatch

Exploit execution Line: 110 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$adminHeader)

Exploit execution Line: 261 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/this_site_logo.php")

Exploit execution Line: 274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/site_checker.php

Size: 31.88 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 245 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['global_test_vars'])

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval(result); var oTable BX('fix_table'); if (oRow BX('in_progress')) { oCell oRow.cells[1]; } else { oRow oTable.insertRow(-1); oCell oRow.insertCell(-1); oCell.style.width '40%'oCell.innerHTML strCurrentTestNameoCell oRow.insertCell(-1); } if (strResult == '') { oRow.setAttribute('id''in_progress'); oCell.innerHTML '<div class="sc_progress" style="width:' test_percent '%">' test_percent '%</div>'; } else { oRow.setAttribute('id'''); oCell.innerHTML SetResult...

Function eval Line: 598 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);

                var 
oTable BX('fix_table');
                if (
oRow BX('in_progress'))
                {
                    
oCell oRow.cells[1];
                }
                else
                {
                    
oRow oTable.insertRow(-1);
                    
oCell oRow.insertCell(-1);
                    
oCell.style.width '40%';
                    
oCell.innerHTML strCurrentTestName;
                    
oCell oRow.insertCell(-1);
                }

                if (
strResult == '')
                {
                    
oRow.setAttribute('id''in_progress');
                    
oCell.innerHTML '<div class="sc_progress" style="width:' test_percent '%">' test_percent ...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/php_command_line.php

Size: 10.84 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 138 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($query);
        
ob_end_flush();
        
printf("<hr>".GetMessage("php_cmd_exec_time")." %0.6f"microtime(1) - $stime);
    }

    require(
$_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_js.php");
    die();
}

$APPLICATION->SetTitle(GetMessage("php_cmd_title"));

CJSCore::Init(array('ls'));

if(
    
$_SERVER['REQUEST_METHOD'] == 'POST'
    
&& $_POST["ajax"] === "y"
    
&& (isset($_POST["add"]) || $remove)
)
{
    
CUtil::JSPostUnescape();
    require_once(
$_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/dump_list.php

Size: 15.74 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 529 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);
            
PartDownload();
        }
        
CHttpRequest.Send(url);
    }

    function 
PartDownload()
    {
        if (!
links || links.length == 0)
            return;

        var 
link links.pop();
        var 
iframe document.createElement('iframe');
        
iframe.style.display "none";
        
iframe.src link;
        
document.body.appendChild(iframe);

        
window.setTimeout(PartDownload10000);
    }

    function 
EndDump()
    {
    }
</
script>
<
div id="dump_result_div"></div>
<?
$lAdmin->DisplayList();

echo 
BeginNote();
echo 
GetMessage("MAIN_DUMP_HEA...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/userfield_edit.php

Size: 18.69 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 2
DescriptionMatch

Function exec Line: 318 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(i);
            if (
&& r[1] > 0)
            {
                
addNewRow('list_table');
            }
        }

    });

});
//-->
</script>
<?
$formAction $APPLICATION->GetCurPage();
$formAction $adminSidePanelHelper->setDefaultQueryParams($formAction);
?>
<form method="POST" action="<?=$formAction?>" ENCTYPE="multipart/form-data" name="post_form">
<?
$tabControl->Begin();
?>
<?
$tabControl->BeginNextTab();
?>
    <?if($ID):?>
    <tr>
        <td width="40%">ID:</td>
        <td width="60%"><?=$ID?></td>
    </tr>
    <?endif?>
    <tr class="adm-detail-r...

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(i);
            if (
&& r[1] > 0)
            {
                
addNewRow('list_table');
            }
        }

    });

});
//-->
</script>
<?
$formAction $APPLICATION->GetCurPage();
$formAction $adminSidePanelHelper->setDefaultQueryParams($formAction);
?>
<form method="POST" action="<?=$formAction?>" ENCTYPE="multipart/form-data" name="post_form">
<?
$tabControl->Begin();
?>
<?
$tabControl->BeginNextTab();
?>
    <?if($ID):?>
    <tr>
        <td width="40%">ID:</td>
        <td width="60%"><?=$ID?></td>
    </tr>
    <?endif?>
    <tr class="adm-detail-r...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/main_controller.php

Size: 8.77 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval($oRequest->arParameters['join_command']); $oResponse->status "200 OK"; } else { $oResponse->status "472 Bad Request"$oResponse->text GetMessage("MAIN_ADM_CONTROLLER_ERR8"); } } elseif(!$oRequest->Check()) { $oResponse->status "403 Access Denied"$oResponse->text "Access Denied"; } else { switch($oRequest->operation) { case "ping"$oResponse->status "200 OK"; break; case "register"$ticket_id COption::GetOptionString("main""controller_ticket"""); list($ticket_created, ...

Function eval Line: 46 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($oRequest->arParameters['join_command']);
        
$oResponse->status "200 OK";
    }
    else
    {
        
$oResponse->status "472 Bad Request";
        
$oResponse->text GetMessage("MAIN_ADM_CONTROLLER_ERR8");
    }
}
elseif(!
$oRequest->Check())
{
    
$oResponse->status "403 Access Denied";
    
$oResponse->text "Access Denied";
}
else
{
    switch(
$oRequest->operation)
    {
        case 
"ping":
            
$oResponse->status "200 OK";
            break;

        case 
"register":
            
$ticket_id COption::GetOptionString("main""controller_ticket",...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/checklist.php

Size: 44.45 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 390 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var DetailWindow = false;
        var arMainStat ={
            "REQUIRE":<?=$arStat["REQUIRE"];?>,
            "REQUIRE_CHECK":<?=$arStat["REQUIRE_CHECK"];?>,
            "FAILED":<?=$arStat["FAILED"];?>,
            "SUCCESS":<?=$arStat["CHECK"];?>,
            "SUCCESS_R":<?=$arStat["CHECK_R"];?>,
            "TOTAL":<?=$arStat["TOTAL"];?>
        };
        var arRequireCount=<?=$arStat["REQUIRE"];?>;
        var arRequireCheckCount=<?=$arStat["REQUIRE_CHECK"];?>;
        var arFailedCount = <?=$arStat["FAILED"];?>;
        var CanClose = "<?=$arCanClose;...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/group_edit.php

Size: 29.20 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval("document.form1.USER_ID_FROM_" id); var ed1 = eval("document.form1.USER_ID_TO_" id); ed.disabled = !obj.checkeded1.disabled = !obj.checked; } </script> <? $ind = -1$dbUsers CUser::GetList(($b="id"), ($o="asc"), array("ACTIVE" => "Y")); while ($arUsers $dbUsers->Fetch()) { $ind++; ?> <tr> <td> <input type="hidden" name="USER_ID_<?=$ind?>" value="<?=$arUsers["ID"?>"> <input type="checkbox" name="USER_ID_ACT_<?=$ind?>" id="USER_ID_ACT_ID_<?=$ind?>" value="Y" <? if (array_key_exis...

Function eval Line: 456 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.USER_ID_FROM_" id);
                var 
ed1 = eval("document.form1.USER_ID_TO_" id);
                
ed.disabled = !obj.checked;
                
ed1.disabled = !obj.checked;
            }
            </
script>
            <?
            
$ind = -1;
            
$dbUsers CUser::GetList(($b="id"), ($o="asc"), array("ACTIVE" => "Y"));
            while (
$arUsers $dbUsers->Fetch())
            {
                
$ind++;
                
?>
                <tr>
                    <td>
                        <input type="hidden" name="USER_ID_<?=$ind?>" value="<?=$arUsers["ID"?>">
                        <input type="checkbox" name="USER_ID_ACT_<?=$ind?>"...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/update_system_market.php

Size: 29.34 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 88 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/admin/update_system_market_notru.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/index.php

Size: 649.00 B Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/dump.php

Size: 46.43 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(result))
            
counter_sec regs[1];
    }
}

function 
IncCounter()
{
    
window.setTimeout(IncCounter1000);
    if (!
counter_started)
        return;

    
counter_sec ++;
    var 
ob;
    if (
ob BX('counter_field'))
    {
        var 
min Math.floor(counter_sec 60);
        var 
sec counter_sec 60;
        if (
min 10)
            
min '0' min;
        if (
sec 10)
            
sec '0' sec;
        
ob.innerHTML min ':' sec;
    }
}
window.setTimeout(IncCounter1000);

function 
GetLicenseInfo()
{
    
CHttpRequest.Action = function(result)
    {
        
BX('...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/message_admin.php

Size: 13.54 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 68 Warning

Double var technique is usually used for the obfuscation of malicious code

${$f}

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/checklist_report.php

Size: 18.84 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 25 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/".LANG."/admin/checklist.php")

Function eval Line: 305 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var Dialog = false;
        var current = 0;
        var next = 0;
        var prev = 0;
        var last_id = false;
        function InitState()
        {
            var el = false;
            for (var i=0;i<arStates["SECTIONS"].length;i++)
            {
                el = arStates["SECTIONS"][i];
                if (el.CHECKED == "Y")
                    BX.addClass(BX(el.ID+"_name"),"checklist-testlist-green");
                BX(el.ID+"_stat").innerHTML = "(<span class=\"checklist-testlist-passed-test\">"+el.CHECK+"</span>/"+el.TOTAL+")";
            }
            for (i=0;i<arStates["POINTS...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/admin/checklist_detail.php

Size: 15.89 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 25 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/".LANG."/admin/checklist.php")

Function eval Line: 311 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("(" +data+")");
                var 
show_result false;
                var 
buttons BX.findChildren(BX('checklist-popup-tes-status'), {className:'checklist-popup-tes-status'});
                if (
json_data.STATUS || stoptest == true)
                {
                    if (
json_data.STATUS)
                    {
                        
BX("show_detail_link").style.display "none";
                        
BX("detail_system_comment_<?=$jsTestID;?>").innerHTML "";
                        
currentStatus json_data.STATUS;
                        
RefreshCheckList(json_data);
                        for(var 
i=0i<buttons.lengthi++)
                        
BX.removeCl...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/tools.php

Size: 176.90 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 2
DescriptionMatch

Exploit download_remote_code2 Line: 3582 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp"Host: ".$_SERVER["HTTP_HOST"]."\nDate: ".date("Y-m-d H:i:s")

Exploit execution Line: 4014 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/countries.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                    else if (
n.appName == "Netscape")
                    {
                        
rv 11;
                        
re = new RegExp("Trident/.*rv:([0-9]+[\.0-9]*)");
                        if (
re.exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                }

                return 
rv;
            }

        })(
windowdocumentnavigator);
JS;
        return 
'<script type="text/javascript" data-skip-moving="true">'.str_replace(array("\n""\t"), ""$js)."</script>";
    }

    public static function 
Get...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/mysql/agent.php

Size: 5.40 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$eval_result=".$arAgent["NAME"]); } catch (Exception $e) { CTimeZone::Enable(); $application = \Bitrix\Main\Application::getInstance(); $exceptionHandler $application->getExceptionHandler(); $exceptionHandler->writeToLog($e); continue; } CTimeZone::Enable(); if ($logFunction$logFunction($arAgent"finish"$eval_result$e); if($e === false) { continue; } elseif($eval_result == '') { $strSql "DELETE FROM b_agent WHERE ID=".$arAgent["ID"]; } else { if ($logFunction && function_exists...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/mysql/database.php

Size: 23.51 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 3
DescriptionMatch

Exploit double_var2 Line: 682 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varnameFrom}

Exploit execution Line: 196 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/dbquery_error.php")

Exploit execution Line: 198 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/dbquery_error.php")

Function strrev eval_strrev Line: 126 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/component_template.php

Size: 30.45 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 3
DescriptionMatch

Exploit execution Line: 719 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__fileAlt)

Exploit execution Line: 725 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__file)

Exploit execution Line: 882 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__folder."/result_modifier.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_client.php

Size: 260.17 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 2 Dangers: 14
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

'X1VwZGF0ZVN5c3RlbScpLCAwLCAxMDI0KTsKICAgICAgICAgICAgICAgICAgICBteV9yZXN1bHQ6PWRibXNfbG9jay5yZXF1ZXN0KG15X2xvY2tfaWQsIGRibXNfbG9jay54X21vZGUsIDAsIHRydWUpOwogICAgICAgICAgICAgICAgICAgIC0tICBSZXR1cm4gdmFsdWU6CiAgICAgICAgICAgICAgICAgICAgLS0gICAgMCAtIHN1Y2Nlc3MKICAgICAgICAgICAgICAgICAgICAtLSAgICAxIC0gdGltZW91dAogICAgICAgICAgICAgICAgICAgIC0tICAgIDIgLSBkZWFkbG9jawogICAgICAgICAgICAgICAgICAgIC0tICAgIDMgLSBwYXJhbWV0ZXIgZXJyb3IKICAgICAgICAgICAgICAgICAgICAtLSAgICA0IC0gYWxyZWFkeSBvd24gbG9jayBzcGVjaWZpZWQgYnk...

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___907956471(2322)

Exploit silenced_eval Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($GLOBALS['____1499103730'][1014](array('<?php''<?''?>')

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($_454603765); else $_1293905249___907956471(132);} catch(Exception $_137227795){ $_1293905249___907956471(133).$_137227795->getCode().___907956471(134).$_137227795->getMessage();} $_1611899787 .= ___907956471(135).$GLOBALS['____1499103730'][50]($_137133016[___907956471(136)][___907956471(137)]).___907956471(138).$GLOBALS['____1499103730'][51]($_1293905249);}} if(empty($_1006194877)){ CUpdateClient::AddMessage2Log($GLOBALS['____1499103730'][52](___907956471(139), ___907956471(140), $_161...

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N5c3Rlb

Sign 7f5d33bf Line: 1 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 91535293 Line: 1 Dangerous

Malware Signature (hash: 91535293)

luY2x1ZG

Sign 963e968a Line: 1 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3RyX

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

Y2xvc2

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZXhlYy

Sign de12c454 Line: 1 Dangerous

Malware Signature (hash: de12c454)

vcGVu

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

Sign f9dc0a55 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/component.php

Size: 41.36 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 1458 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$epilogFile)

Exploit execution Line: 604 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__path."/component.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_update.php

Size: 89.67 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 2573 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("DescrDetList_"+sModule));
            
wnd.document.write('</font>');
            
wnd.document.write('\n</body></html>');
        }
        
//-->
        
</script>

        <
table border="0" cellspacing="1" cellpadding="2" width="99%">
        <
tr>
            <
td align="center" class="tablehead1"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DATE"?></font></td>
            <td align="center" class="tablehead2"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DESCR"?></font></td>
            <td align="center" class="tablehead3"><font class="tablehe...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/site_checker.php

Size: 92.75 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 4
DescriptionMatch

Exploit execution Line: 2985 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/license_key.php')

Exploit execution Line: 3071 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/dbconn_error.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('catdoc -V'$output$return_var);
            if (
$return_var === 0)
            {
                
$version $output[0];
                if (
strpos($version'0.94.4') !== false || strpos($version'0.94.3') !== false)
                    
$strError .= GetMessage('MAIN_CATDOC_WARN', array('#VERSION#' => $version));
            }
        }

        return 
$this->Result(false$strError);
    }

    function 
check_fast_download()
    {
        
$tmp $_SERVER['DOCUMENT_ROOT'].'/bitrix/tmp/success.txt';
        if (!
CheckDirPath($tmp) || !file_put_contents($tmp'SUCCESS'))
            return 
$thi...

Sign 471b95ee Line: 552 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

Sign 471b95ee Line: 554 Dangerous

Malware Signature (hash: 471b95ee)

SUHOSIN

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_client_partner.php

Size: 75.20 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 564 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/main.php

Size: 142.43 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 4 Dangers: 8
DescriptionMatch

Exploit double_var2 Line: 221 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

Exploit execution Line: 1361 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path)

Exploit execution Line: 205 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 207 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin.php")

Exploit execution Line: 287 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/prolog".$isAdmin"_after.php")

Exploit execution Line: 304 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/interface/auth/wrapper.php")

Exploit execution Line: 314 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog".$isAdmin.".php")

Exploit silenced_eval Line: 4536 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return ".$strCondition.";")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a[1] == $b[1]) return 0; return ($a[1] < $b[1])? -1 : 1;')); $res = array(); foreach($this->__view[$view] as $item$res[] = $item[0]; return implode($res); } public static function OnChangeFileComponent($path$site) { if(HasScriptExtension($path)) { if($site === false) { $site SITE_ID; } $docRoot CSite::GetSiteDocRoot($site); Main\UrlRewriter::delete($site, array("PATH" => $path"!ID" => '')); Main\Component\ParametersTable::deleteByFilter(array("SITE_ID" =>...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>".$fTmp->GetContents()); } $FILE_PERM $PERM[$path_file]; if(!is_array($FILE_PERM)) $FILE_PERM = array(); if(!$bOverWrite && count($FILE_PERM)>0) return true$bDiff false$str="<?\n"; foreach($arPermissions as $group=>$perm) { if(strlen($perm) > 0$str .= "\$PERM[\"".EscapePHPString($path_file)."\"][\"".EscapePHPString($group)."\"]=\"".EscapePHPString($perm)."\";\n"; if(!$bDiff) { $curr_perm $FILE_PERM[$group]; if(!isset($curr_perm) && preg_match('/^G[0-9]+$/'$group)) $curr_per...

Function posix_kill Warning

Potentially dangerous function `posix_kill`

[https://www.php.net/posix_kill]

posix_kill(getmypid(), 9);')); define("BX_FORK_AGENTS_AND_EVENTS_FUNCTION_STARTED", true); global $DB, $CACHE_MANAGER; $CACHE_MANAGER = new CCacheManager; $DBHost = $DB->DBHost; $DBName = $DB->DBName; $DBLogin = $DB->DBLogin; $DBPassword = $DB->DBPassword; $DB = new CDatabase; $DB->Connect($DBHost, $DBName, $DBLogin, $DBPassword); $app = \Bitrix\Main\Application::getInstance(); if ($app != null) { $con = $app->getConnection(); if ($con != null) $con->connect(); } $DB->DoConnect(); $DB->StartUsin...

Sign 11413268 Line: 1562 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/checklist.php

Size: 42.07 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 298 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arPoint["FILE_PATH"])

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_b24.php

Size: 11.96 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tstart\t".$moduleId.$arUpdaters[$i1][0]); CUpdateClient::RunUpdaterScript($this->updatersDir.$moduleId.$arUpdaters[$i1][0], $errorMessageTmp""$moduleId); syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tend\t".$moduleId.$arUpdaters[$i1][0]."\t".$errorMessageTmp); if (strlen($errorMessageTmp) > 0$errorMessage .= str_replace("#MODULE#"$moduleIdstr_replace("#VER#"$arUpdaters[$i1][1], GetMessage("SUPP_UK_UPDN_ERR"))).": ".$errorMessageTmp."."$this->Col...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/menu.php

Size: 15.46 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) $bSkipMenuItem true; } if(!$bSkipMenuItem$ITEM_INDEX++; if(($pos strpos($LINK"?"))!==false$ITEM_TYPE "U"; elseif(substr($LINK, -1)=="/"$ITEM_TYPE "D"; else $ITEM_TYPE "P"$SELECTED false; if($bCached) { $all_links $arMenuCache[$iMenuItem]["LINKS"]; if(!is_array($all_links)) $all_links = array(); } else { $all_links = array(); if(is_array($ADDITIONAL_LINKS)) { foreach($ADDITIONAL_LINKS as $link) { $tested_link trim(Rel2Abs($this->MenuDir, ...

Function eval Line: 273 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";")))
                    
$bSkipMenuItem true;
            }

            if(!
$bSkipMenuItem)
                
$ITEM_INDEX++;

            if((
$pos strpos($LINK"?"))!==false)
                
$ITEM_TYPE "U";
            elseif(
substr($LINK, -1)=="/")
                
$ITEM_TYPE "D";
            else
                
$ITEM_TYPE "P";

            
$SELECTED false;

            if(
$bCached)
            {
                
$all_links $arMenuCache[$iMenuItem]["LINKS"];
                if(!
is_array($all_links))
                    
$all_links = array();
            }
            else
            {
                
$all_links = array();
                if(
is_array($ADDITIONAL_LINKS))
                {...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_class.php

Size: 140.89 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 3
DescriptionMatch

Exploit execution Line: 3798 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

Exploit silenced_eval Line: 3274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\"),(\$order=\"\"),array(\"ACTIVE\"=>\"Y\"));\$cnt=0;while(\$ar_"."res=\$path->Fe"."tch())\$cnt++;");
        return 
$cnt;}
    }

    public static function 
GetModuleVersion($module)
    {
        if (
strlen($module)<=0)
            return 
false;

        
$strModule_tmp_dir $_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module;
        if (
file_exists($strModule_tmp_dir) && is_dir($strModule_tmp_dir))
        {
            if (
$module != "main")
            {
                if (
file_exists($strModule_tmp_dir."/insta...

Sign 696317c4 Line: 3274 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/user.php

Size: 154.48 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 5412 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/database.php

Size: 33.17 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 4
DescriptionMatch

Exploit double_var2 Line: 1055 Warning

Double var technique is usually used for the obfuscation of malicious code

${$SHOWALL_NAME}

Exploit execution Line: 133 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/dbconn_error.php")

Exploit execution Line: 135 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/dbconn_error.php")

Exploit execution Line: 229 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/after_connect.php")

Function strrev eval_strrev Line: 35 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/sql_util.php

Size: 23.22 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tmp[] = "(1 = 2)"; else $arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))"; } elseif ($arFields[$key]["TYPE"] == "double") { array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tm...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/wizard_site.php

Size: 40.78 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 2
DescriptionMatch

Function create_function Line: 878 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);'));

        if (
array_key_exists("GROUPS"$arWizardTemplates) && is_array($arWizardTemplates["GROUPS"]))
            
$this->arTemplateGroups $arWizardTemplates["GROUPS"];
    }

    function 
__GetInstallationScript()
    {
        
$instScript $_SERVER["DOCUMENT_ROOT"].$this->path."/wizard.php";

        if (!
is_file($instScript))
            return 
false;

        
$this->pathToScript $instScript;
        return 
true;
    }

    function 
__GetServices()
    {
        
$serviceFile $_SERVER["DO...

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);'));

        if (
array_key_exists("GROUPS"$arWizardTemplates) && is_array($arWizardTemplates["GROUPS"]))
            
$this->arTemplateGroups $arWizardTemplates["GROUPS"];
    }

    function 
__GetInstallationScript()
    {
        
$instScript $_SERVER["DOCUMENT_ROOT"].$this->path."/wizard.php";

        if (!
is_file($instScript))
            return 
false;

        
$this->pathToScript $instScript;
        return 
true;
    }

    function 
__GetServices()
    {
        
$serviceFile $_SERVER["DO...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/component_util.php

Size: 49.99 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 6
DescriptionMatch

Exploit execution Line: 1011 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/.parameters.php")

Exploit execution Line: 1109 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolderPath."/".$file1."/.description.php")

Exploit execution Line: 184 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$componentFolder."/".$file."/.description.php")

Exploit execution Line: 253 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$componentFolder."/".$file."/".$file1."/.description.php")

Exploit execution Line: 427 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$componentPath."/.description.php")

Exploit execution Line: 478 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$componentPath."/.parameters.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/controller_member.php

Size: 41.86 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 1076 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['parameters'])

Function eval Line: 551 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($disconnect_command);
        
COption::SetOptionString("main""controller_member""N");
    }

    public static function 
GetBackup($bRefresh false)
    {
        static 
$arCachedData;
        if(!isset(
$arCachedData) || $bRefresh)
            
$arCachedData unserialize(COption::GetOptionString("main""~controller_backup"""));

        return 
$arCachedData;
    }

    public static function 
SetBackup($arBackup)
    {
        
COption::SetOptionString("main""~controller_backup"serialize($arBackup));
        
CControllerClient::GetBackup(true);...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_list.php

Size: 1.21 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 30 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("parent."+this.name+"_"+str);
    }
    catch(
e){}
}
</
script>

</
head>
<
body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0" bgcolor="white">

<
table width="100%" border="0" id="updates_items">
</
table>

</
body>
</
html>
<?
require(
$_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/update_log.php

Size: 4.71 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Line: 93 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a['.$sort.'], $b['.$sort.'])*('.$ord.');'));
}

$rsData = new CAdminResult(null$sTableID);
$rsData->InitFromArray($arLogRecs);
$rsData->NavStart();
$lAdmin->NavText($rsData->GetNavPrint(GetMessage("update_log_nav")));

$n 0;
while(
$rec $rsData->Fetch())
{
    
$row = &$lAdmin->AddRow(0null);

    
$aDate explode(" "htmlspecialcharsbx($rec[1]));
    
$row->AddField("DATE"'<span style="white-space:nowrap">'.$aDate[0].'</span> '.$aDate[1]);

    
$row->AddFie...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/zip.php

Size: 67.00 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$res = '.$arParams['callback_pre_add'].'(\'callback_pre_add\', $arLocalHeader);'); if ($res == 0) { $arHeader['status'] = "skipped"$res 1; } if ($arHeader['stored_filename'] != $arLocalHeader['stored_filename']) { $arHeader['stored_filename'] = $this->_reducePath($arLocalHeader['stored_filename']); } } if ($arHeader['stored_filename'] == "") { $arHeader['status'] = "filtered"; } if (strlen($arHeader['stored_filename']) > 0xFF) { $arHeader['status'] = 'filename_too_long'; } if ($arHeade...

Sign 963e968a Line: 2571 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/vuln_scanner.php

Size: 64.50 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Sign f9dc0a55 Line: 1977 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/pizzalaroma.kz/public_html/bitrix/modules/main/classes/general/grids.php

Size: 16.11 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);')); return $arThemes; } public static function GetTheme($grid_id) { $aOptions CUserOptions::GetOption("main.interface.grid"$grid_id, array()); if($aOptions["theme"] == '') { $aGlobalOptions CUserOptions::GetOption("main.interface""global", array(), 0); if($aGlobalOptions["theme_template"][SITE_TEMPLATE_ID] <> ''$theme $aGlobalOptions["theme_template"][SITE_TEMPLATE_ID]; else $theme ""; } else { $theme $aOptions["th...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/start.php

Size: 32.25 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 8
DescriptionMatch

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___1548153951(321)

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 963e968a Line: 1 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3Rhd

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

YXJyYXlf

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

zeXN0ZW

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/wizard_sol/utils.php

Size: 13.66 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 2 Dangers: 2
DescriptionMatch

Function create_function Dangerous

Encoded Function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);')); return $arWizardTemplates; } function GetTemplatesPath($path) { $templatesPath $path."/templates"; if (file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID)) $templatesPath .= "/".LANGUAGE_ID; return $templatesPath; } function GetServices($wizardPath$serviceFolder ""$arFilter = Array()) { $arServices = Array(); $wizardPath rtrim($wizardPath"/"); $serviceFolder rtrim($serviceFolder"/"); if (LANGU...

Function create_function Line: 87 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);'));
        return 
$arWizardTemplates;
    }

    function 
GetTemplatesPath($path)
    {
        
$templatesPath $path."/templates";

        if (
file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID))
            
$templatesPath .= "/".LANGUAGE_ID;

        return 
$templatesPath;
    }

    function 
GetServices($wizardPath$serviceFolder ""$arFilter = Array())
    {
        
$arServices = Array();

        
$wizardPath rtrim($wizardPath"/");
        
$serviceFolder rtrim($se...

Function eval Line: 319 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>".file_get_contents($documentRoot.$pathDir."/.access.php"));
        }

        if (!isset(
$PERM[$pathFile]) || !is_array($PERM[$pathFile]))
            
$arPermisson $permissions;
        else
            
$arPermisson $permissions $PERM[$pathFile];

        return 
$GLOBALS["APPLICATION"]->SetFileAccessPermission($originalPath$arPermisson);
    }

    function 
AddMenuItem($menuFile$menuItem,  $siteID$pos = -1)
    {
        if (
CModule::IncludeModule('fileman'))
        {
            
$arResult CFileMan::GetMenuArray($_SERVER["DOCUMENT_ROOT"].$me...

Sign 11413268 Line: 319 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/wizard_sol/template.php

Size: 9.27 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.interface.grid/component.php

Size: 9.39 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);'); uasort($aOptions["views"], $func); $arResult["OPTIONS"] = $aOptions$arResult["GLOBAL_OPTIONS"] = CUserOptions::GetOption("main.interface""global", array(), 0); if($arParams["USE_THEMES"]) { if($arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID] <> ''$arResult["GLOBAL_OPTIONS"]["theme"] = $arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID]; if($arResult["OPTIONS"]["theme"] == ''$arResult["OPTIONS"...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 43.87 kB Created: 2023-02-22 17:08:22 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arParams.MESSAGES = messages;

            if (action !== 'more')
            {
                Grid.arPar...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.mail.form/templates/.default/template.php

Size: 20.09 kB Created: 2023-02-22 17:08:22 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit nano Line: 287 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$field['render']($field)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.user.link/component.php

Size: 19.51 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 445 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$folderPath."/card.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.map/component.php

Size: 5.85 kB Created: 2023-02-22 17:08:22 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 157 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$full_path.".section.php")

Function eval Line: 87 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";")))
                                continue;
                        }

                        
$search_child false;
                        
$search_path '';
                        
$full_path '';
                        if (
$aMenu[1] <> '')
                        {
                            if(
preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1]))
                            {
                                
$full_path $aMenu[1];
                            }
                            else
                            {
                                
$full_path trim(Rel2Abs(substr($PARENT_PATHstrlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1]));

                                
$slash_pos strrpos($full_path"/");
                                if (
$slash_pos !== f...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.numerator.edit/templates/admin/template.php

Size: 312.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/components/bitrix/main.post.form/templates/.default/template.php

Size: 14.35 kB Created: 2023-02-22 17:08:22 Modified: 2023-11-24 20:43:48 Dangers: 3
DescriptionMatch

Exploit execution Line: 124 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/file.php")

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/urlpreview.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/profile.php

Size: 29.00 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 7 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_POSTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/auth/forgot_password.php

Size: 2.54 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/auth/authorize.php

Size: 3.79 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/auth/registration.php

Size: 6.25 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/auth/change_password.php

Size: 3.49 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/auth/authorize_registration.php

Size: 6.90 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/templates/main/map/default.php

Size: 13.58 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 7
DescriptionMatch

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$PARENT_PATH..trim($cmenu)

Exploit execution Line: 203 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$child_menu)

Exploit execution Line: 209 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$PARENT_PATH.".".trim($cmenu)

Exploit execution Line: 341 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$main_menu)

Exploit extract_global Line: 14 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

Exploit silenced_eval Line: 220 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return ".$CONDITION.";")

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } if (strlen($aMenu[1])>0) { $search_child true; if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) $full_path $aMenu[1]; else $full_path trim(Rel2Abs($PARENT_PATH$aMenu[1])); } else { $search_child false$full_path $PARENT_PATH; } if (strlen($full_path)>0) { $FILE_ACCESS = (preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$full_path)) ? "R" $APPLICATION->GetFileAccessPermission($full_path); if ($FILE_ACCESS!="D" ...

Function eval Line: 220 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";")))
                            continue;
                    }

                    if (
strlen($aMenu[1])>0)
                    {
                        
$search_child true;
                        if(
preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1]))
                            
$full_path $aMenu[1];
                        else
                            
$full_path trim(Rel2Abs($PARENT_PATH$aMenu[1]));
                    }
                    else
                    {
                        
$search_child false;
                        
$full_path $PARENT_PATH;
                    }

                    if (
strlen($full_path)>0)
                    {
                        
$FILE_ACCESS = (preg_match("'^(([A-Za-z]+://)|mailto:|javascr...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/admin_info/index.php

Size: 2.18 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/probki/.description.php

Size: 142.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.description.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/probki/.parameters.php

Size: 102.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.parameters.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/probki/index.php

Size: 98.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/index.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/admin_security/index.php

Size: 4.50 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/weather/.description.php

Size: 143.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.description.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/weather/.parameters.php

Size: 103.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.parameters.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/gadgets/bitrix/weather/index.php

Size: 99.00 B Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/index.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/bitrix/index.php

Size: 83.00 B Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/bitrix/coupon_activation.php

Size: 16.67 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 148 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/wizard/utils.php

Size: 29.34 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 568 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$wizardPath."/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/wizard/template.php

Size: 9.12 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 42 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/install/wizard/wizard.php

Size: 279.44 kB Created: 2023-02-22 17:08:21 Modified: 2023-11-24 20:43:48 Warns: 1 Dangers: 14
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

'CgkJCTwvdGFibGU+CgkJCTxkaXYgaWQ9ImxpY19rZXlfYWN0aXZhdGlvbiI+CgkJCTx0YWJsZSBib3JkZXI9IjAiIGNsYXNzPSJkYXRhLXRhYmxlIiBzdHlsZT0iYm9yZGVyLXRvcDpub25lOyI+CgkJCTx0cj4KCQkJCTx0ZCBhbGlnbj0icmlnaHQiIHdpZHRoPSI0MCUiIHN0eWxlPSJib3JkZXItdG9wOm5vbmU7Ij48c3BhbiBzdHlsZT0iY29sb3I6cmVkIj4qPC9zcGFuPiZuYnNwOw=='

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___1227055840(2624)

Sign 0f37c730 Line: 1 Dangerous

Malware Signature (hash: 0f37c730)

mdW5jdGlvb

Sign 4a069524 Line: 1 Dangerous

Malware Signature (hash: 4a069524)

aW5jbHVkZ

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 7f5d33bf Line: 1 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Dangerous

Malware Signature (hash: a408f408)

c3Rhd

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3lzdGVt

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

yZXBsYWNl

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZnVuY3Rpb2

Sign de12c454 Dangerous

Malware Signature (hash: de12c454)

V2YW

Sign de12c454 Line: 1 Dangerous

Malware Signature (hash: de12c454)

VjaG

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

/home/pizzalaroma.kz/public_html/bitrix/modules/main/public/menu_edit.php

Size: 21.23 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 2
DescriptionMatch

Function eval Line: 493 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.$out.'\');';
?>

    var arCellsHTML = [
        '<span class="rowcontrol drag" title="<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_DRAG'))?>"></span>',
        getAreaHTML('text_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_TEXT_EDIT'))?>'),
        getAreaHTML('link_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_LINK_EDIT'))?>'),
        '<span onclick="if (!GLOBAL_bDisableActions) {currentLink = \'' + nums + '\'; OpenFileBrowserWindFile_' + nums + '();}" class="rowcontrol...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\$out.'\');';
?>

    var arCellsHTML = [
        '<span class="rowcontrol drag" title="<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_DRAG'))?>"></span>',
        getAreaHTML('text_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_TEXT_EDIT'))?>'),
        getAreaHTML('link_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_LINK_EDIT'))?>'),
        '<span onclick="if (!GLOBAL_bDisableActions) {currentLink = \'' + nums + '\'; OpenFileBrowserWindFile_' + nums + '();}" class="rowcontrol fo...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/public/top_panel.php

Size: 58.63 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 948 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/include/add_top_panel.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/spread.php

Size: 1.34 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_GET["s"])

Exploit execution Line: 7 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/include/urlrewrite.php

Size: 5.13 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 169 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/404.php")

Exploit execution Line: 59 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT']."/urlrewrite.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/include/prolog_after.php

Size: 4.73 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 3
DescriptionMatch

Exploit execution Line: 34 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

Exploit execution Line: 85 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteClosed)

Exploit execution Line: 93 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/site_closed.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/ru/admin/site_checker.php

Size: 81.79 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 94 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/en/admin/site_checker.php

Size: 51.64 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 397 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

Sign 471b95ee Line: 574 Dangerous

Malware Signature (hash: 471b95ee)

SUHOSIN

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/en/admin/update_system.php

Size: 17.16 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function system Line: 96 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install them first.";
$MESS["SUP_SUBS_BUTTON"] = "Download source code";
$MESS["SUP_SUPPORT_BUTTON"] = "Reload All Files";
$MESS["SUP_INITIAL"] = "Initialising...";
$MESS["SUP_SUBS_SUCCESS"] = "The source code has been downloaded successfully";
$MESS["SUP_SUPPORT_SUCCESS"] = "Files has been downloaded successfully.";
$MESS["SUP_SUBS_MED"] = "Downloaded source code for";
$MESS["SUP_SUPPORT_MED...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/en/classes/general/update_client.php

Size: 24.45 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function system Line: 67 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first.";
$MESS["SUP_SRC_ACT"] = "Download source code";
$MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license.";
$MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation.";
$MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/en/classes/general/update_update.php

Size: 22.66 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function system Line: 68 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first.";
$MESS["SUP_SRC_ACT_ALT"] = "Download source code";
$MESS["SUP_SRC_ACT"] = "Download source code";
$MESS["SUP_SITES_PROMT"] = "You cannot create more than #NUM# site#END# using this kernel according to your license. If you need more sites, you can buy them any time. After you have purchased the additional sites, you will have to add them to the system.";
$MESS["SUP_SITES_AC...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lang/en/classes/general/update_update5.php

Size: 25.89 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function system Line: 67 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first.";
$MESS["SUP_SRC_ACT"] = "Download source code";
$MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license.";
$MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of wesbsites using this product installation.";
$MESS["SUP_CHECK_PROMT_1"] = "You can extend your period of technical support, purchase additi...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/include.php

Size: 62.16 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 11
DescriptionMatch

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___1078282512(134)

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 91535293 Line: 1 Dangerous

Malware Signature (hash: 91535293)

luY2x1ZG

Sign 963e968a Line: 1 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3Rhd

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

Y2hy

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZnVuY3Rpb2

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

Sign f9dc0a55 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/modulemanager.php

Size: 3.03 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 54 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/composite/responder.php

Size: 18.26 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 650 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/cluster/memcache.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/config/option.php

Size: 9.72 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 129 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varName}

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/config/configuration.php

Size: 10.93 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 294 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/cluster/memcache.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/data/connectionpool.php

Size: 8.44 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 26 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/orm/query/query.php

Size: 88.11 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->is_executing true$query $this->buildQuery(); $cacheId ""$ttl 0$result null; if($this->cacheTtl && (empty($this->join_map) || $this->cacheJoins == true)) { $ttl $this->entity->getCacheTtl($this->cacheTtl); } if($ttl 0) { $cacheId md5($query); $result $this->entity->readFromCache($ttl$cacheId$this->countTotal); } if($result === null) { $result $this->query($query); if($ttl 0) { $result $this->entity->writeToCache($result$cacheId$this->count...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/orm/entity.php

Size: 30.34 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); $entity self::getInstance($entity_name); foreach ($fieldsMap as $k => $v) { $entity->addField($v$k); } return $entity; } public static function compileEntity($entityName$fields null$parameters = array()) { $classCode ''$classCodeEnd ''; if (strtolower(substr($entityName, -5)) !== 'table') { $entityName .= 'Table'; } if (!preg_match('/^[a-z0-9_]+$/i'$entityName)) { throw new Main\ArgumentException(sprintf'Invalid entity className `%s`.'$entityName )); } $fullEnt...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/db/connection.php

Size: 23.29 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 318 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/userconsent/consent.php

Size: 4.81 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit nano Line: 150 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$provider['DATA']($originId)

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/userconsent/internals/componentcontroller.php

Size: 1.99 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse()

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/ui/uploader/uploader.php

Size: 13.06 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Line: 274 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$v,$k',
            
'if($k=="error"){$v=preg_replace("/<(.+?)>/is".BX_UTF_PCRE_MODIFIER, "", $v);}'));
        return 
self::removeTmpPath($data);
    }

    
/**
     * @return bool
     * @throws AccessDeniedException
     * @throws ArgumentOutOfRangeException
     * @throws NotImplementedException
     */
    
protected function fillRequireData()
    {
        
$this->mode $this->getRequest("mode");
        if (!
in_array($this->mode, array("upload""delete""view")))
            throw new 
ArgumentOutOfRangeException("mode");

        if (
$thi...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/ui/fileinputunclouder.php

Size: 3.02 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($mode "basic"$params = array()) { $res $this->check($params); if ($this->check($params)) { $this->file = \CFile::getByID($this->id)->fetch(); if ($mode == "resize" && ($file = \CFile::ResizeImageGet($this->id$paramsBX_RESIZE_IMAGE_PROPORTIONALtruefalsetrue)) && $file) { $this->file["SRC"] = $file["src"]; $this->file["WIDTH"] = $file["width"]; $this->file["HEIGHT"] = $file["height"]; $this->file["FILE_SIZE"] = $file["size"]; } \CFile::ViewByUser($this->file, array("force_down...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/ui/fileinputreceiver.php

Size: 6.95 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->getAgent()->checkPost()

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/mail/eventmessagethemecompiler.php

Size: 10.14 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('use \Bitrix\Main\Mail\EventMessageThemeCompiler; ob_start();?>' $template '<? return ob_get_clean();'); } catch(StopException $e) { ob_clean(); throw $e; } return $result; } protected function addReplaceCallback($identificator$callback) { $this->replaceCallback[$identificator] = $callback; } protected function executeReplaceCallback() { $arReplaceIdentificators = array(); $arReplaceStrings = array(); foreach($this->replaceCallback as $identificator => $callback) { $result call_user...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/cli/ormannotatecommand.php

Size: 28.87 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Warns: 3
DescriptionMatch

Exploit double_var2 Line: 611 Warning

Double var technique is usually used for the obfuscation of malicious code

${$lName}

Exploit double_var2 Line: 750 Warning

Double var technique is usually used for the obfuscation of malicious code

${$objectVarName}

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()"; $code[] = "\* @method {$objectClassfetchObject()"; $code[] = "\* @method {$collectionClassfetchCollection()"; $code[] = "\*/"; $code[] = "\tclass {$queryClassName} extends \\".Query::class." {}"; $code[] = "\t/**"; $code[] = "\t * @method {$objectClass} fetchObject()"; $code[] = "\t * @method {$collectionClass} fetchCollection()"; $code[] = "\t */"; $code[] = "\tclass {$resultClassName} extends \\".\Bitrix\Main\ORM\Query\Result::class." {}"; $code[] = "\t/**"; $code[] = "\t * ...

/home/pizzalaroma.kz/public_html/bitrix/modules/main/lib/engine/controller.php

Size: 19.32 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit nano Line: 591 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$config['class']($actionName$this$config)

/home/pizzalaroma.kz/public_html/bitrix/modules/clouds/admin/clouds_file_list.php

Size: 29.22 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 142 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/modules/form/options.php

Size: 17.96 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function exec Line: 253 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(data.URL);
        if (!
res)
        {
            var 
proto data.URL.match(/\.bitrix24\./) ? 'https' 'http';

            
data.URL proto '://' data.URL;
            
res r.exec(data.URL);
        }

        if (
res)
        {
            
data.URL_SERVER res[1]+'://'+res[2];
            
data.URL_PATH res[3];
        }
    }

    if (!
data.AUTH_HASH)
    {
        var 
content '<div class="form-crm-settings"><form name="form_'+popup_id+'"><table cellpadding="0" cellspacing="2" border="0"><tr><td align="right"><?=CUtil::JSEscape(GetMessage('FORM_TAB_CRM_ROW_TITLE'))?>:</...

/home/pizzalaroma.kz/public_html/bitrix/modules/form/admin/form_field_edit.php

Size: 31.00 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function eval Line: 559 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('function() {FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();}');
            
arInputs[i].onchange = new Function('FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();');
        }

        if (
new_name == 'MESSAGE_' + (rows_count+1))
        {
            
arInputs[i].onchange jsFormValidatorSettings.UpdateAll;
        }
    }

    var 
input1 BX.create('INPUT', {
        
props: {
            
type'hidden',
            
name'ANSWER[]',
            
valuerows_count 1
        
}
    }),
        
input2 BX.create('...

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformfield.php

Size: 413.00 B Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformanswer.php

Size: 418.00 B Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformresult.php

Size: 15.00 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformstatus.php

Size: 5.58 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformvalidator.php

Size: 368.00 B Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cform.php

Size: 6.01 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/mysql/form_cformoutput.php

Size: 400.00 B Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_cform_old.php

Size: 9.20 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 77 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path.$template)

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callform.php

Size: 65.17 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Warns: 2 Dangers: 1
DescriptionMatch

Exploit double_var2 Line: 522 Warning

Double var technique is usually used for the obfuscation of malicious code

${$var}

Exploit double_var2 Line: 532 Warning

Double var technique is usually used for the obfuscation of malicious code

${$var2}

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_cformresult_old.php

Size: 7.20 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 78 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path.$template)

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformstatus.php

Size: 17.77 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformfield.php

Size: 22.20 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformoutput.php

Size: 33.92 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Warns: 2 Dangers: 1
DescriptionMatch

Function eval Line: 100 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>'.$this->__cache_tpl.'<?');
            
$strReturn ob_get_contents();
            
ob_end_clean();

            return 
$strReturn;
        }
        else
        {
            return 
false;
        }
    }

    function 
IncludeFormTemplate()
    {
        global 
$APPLICATION;
        if (
$this->__check_form_cache())
        {
            
$APPLICATION->SetTemplateCSS("form/form.css");
            
$FORM =& $this;
            eval(
$this->__cache_tpl);

            return 
true;
        }
        else
        {
            return 
false;
        }
    }

    function 
isStatisticIncluded()
    {
        return 
CModule::IncludeModule("statistic");
    }

    
/**
     * P...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>'.$this->__cache_tpl.'<?');
            
$strReturn ob_get_contents();
            
ob_end_clean();

            return 
$strReturn;
        }
        else
        {
            return 
false;
        }
    }

    function 
IncludeFormTemplate()
    {
        global 
$APPLICATION;
        if (
$this->__check_form_cache())
        {
            
$APPLICATION->SetTemplateCSS("form/form.css");
            
$FORM =& $this;
            eval(
$this->__cache_tpl);

            return 
true;
        }
        else
        {
            return 
false;
        }
    }

    function 
isStatisticIncluded()
    {
        return 
CModule::IncludeModule("statistic");
    }

    
/**
     * P...

Sign 11413268 Line: 100 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformanswer.php

Size: 7.88 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformresult.php

Size: 67.99 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/classes/general/form_callformvalidator.php

Size: 7.56 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/form/install/components/bitrix/form.result.list/component.php

Size: 18.44 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:48 Warns: 1
DescriptionMatch

Function create_function Line: 108 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=trim(\$item);"));
        
TrimArr($arParams["arrNOT_SHOW_FILTER"]);

    else 
$arParams["arrNOT_SHOW_FILTER"]=array();

    if (
is_array($arParams["NOT_SHOW_TABLE"]))
    {
        
$arParams["arrNOT_SHOW_TABLE"] = $arParams["NOT_SHOW_TABLE"];
    }
    else
    {
        
$arParams["arrNOT_SHOW_TABLE"] = explode(",",$arParams["NOT_SHOW_TABLE"]);
    }
    if (
is_array($arParams["arrNOT_SHOW_TABLE"])) //array_walk($arParams["arrNOT_SHOW_TABLE"], create_function("&\$item", "\$item=trim(\$item);"));
        
Trim...

/home/pizzalaroma.kz/public_html/bitrix/modules/fileman/options.php

Size: 66.54 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit execution Line: 1050 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/'.LANGUAGE_ID.'/admin/fileman_js.php')

Exploit execution Line: 1052 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/en/admin/fileman_js.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/fileman/admin/fileman_admin.php

Size: 51.14 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:49 Warns: 2 Dangers: 1
DescriptionMatch

Exploit execution Line: 17 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/fileman_access.php")

Function posix_getpwuid Line: 680 Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid(fileowner($fnameConverted));
                    
$arrFileGroup posix_getgrgid(filegroup($fnameConverted));
                    
$showField .= " ".$arrFileOwner['name']." ".$arrFileGroup['name'];
                }
            }
            else
                
$showField "&nbsp;";
        }
        
$row->AddField("PERMS"$showField);
    }

    
$showField "";
    if (
in_array("PERMS_B"$arVisibleColumns))
    {
        
$showField "&nbsp;";
        if((
$USER->CanDoOperation('fileman_view_permissions') || $USER->CanDoOperation('fileman_edit_all_settings')) && $USER->CanDoFileOpera...

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid(fileowner($fnameConverted));
                    
$arrFileGroup posix_getgrgid(filegroup($fnameConverted));
                    
$showField .= " ".$arrFileOwner['name']." ".$arrFileGroup['name'];
                }
            }
            else
                
$showField "&nbsp;";
        }
        
$row->AddField("PERMS"$showField);
    }

    
$showField "";
    if (
in_array("PERMS_B"$arVisibleColumns))
    {
        
$showField "&nbsp;";
        if((
$USER->CanDoOperation('fileman_view_permissions') || $USER->CanDoOperation('fileman_edit_all_settings')) && $USER->CanDoFileOpera...

/home/pizzalaroma.kz/public_html/bitrix/modules/fileman/admin/fileman_js.php

Size: 1.58 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/'.LANGUAGE_ID.'/admin/fileman_js.php')

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/en/admin/fileman_js.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/fileman/classes/general/editor_utils.php

Size: 8.27 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:49 Warns: 2
DescriptionMatch

Function eval Line: 111 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code);
        echo  
'#BX_RENDERED_COMPONENT#';
        
$s ob_get_contents();
        
ob_end_clean();

        return 
$s;
    }

    function 
_RenderAllComponents($arParams$bLPA)
    {
        global 
$APPLICATION$USER;
        
$s '';
        
$arPHP PHPParser::ParseFile($arParams['source']);
        
$l count($arPHP);
        if (
$l 0)
        {
            
$new_source '';
            
$end 0;
            
$comp_count 0;
            
ob_start();
            for (
$n 0$n<$l$n++)
            {
                
//Trim php tags
                
$src $arPHP[$n][2];
                if (
SubStr($src05) == "<?"."php")
                    
$src = ...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code);
        echo  
'#BX_RENDERED_COMPONENT#';
        
$s ob_get_contents();
        
ob_end_clean();

        return 
$s;
    }

    function 
_RenderAllComponents($arParams$bLPA)
    {
        global 
$APPLICATION$USER;
        
$s '';
        
$arPHP PHPParser::ParseFile($arParams['source']);
        
$l count($arPHP);
        if (
$l 0)
        {
            
$new_source '';
            
$end 0;
            
$comp_count 0;
            
ob_start();
            for (
$n 0$n<$l$n++)
            {
                
//Trim php tags
                
$src $arPHP[$n][2];
                if (
SubStr($src05) == "<?"."php")
                    
$src = ...

/home/pizzalaroma.kz/public_html/bitrix/modules/fileman/fileman.php

Size: 72.66 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 248 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/fileman/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/mobileapp/install/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function exec Line: 186 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/home/pizzalaroma.kz/public_html/bitrix/modules/rest/lib/marketplace/transport.php

Size: 3.02 kB Created: 2023-02-22 17:08:33 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 110 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'] . '/bitrix/license_key.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/admin/menu.php

Size: 1.17 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit php_uname Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname('s')

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/include/rolesdefinitions.php

Size: 2.59 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 64 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 68 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/include/actionsdefinitions.php

Size: 20.36 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 171 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 172 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lang/ru/include/actionsdefinitions.php

Size: 5.86 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lang/en/include/actionsdefinitions.php

Size: 4.46 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/shelladapter.php

Size: 1.88 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Warns: 3 Dangers: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($command" > ".$outputPath." 2>&1 &"); return true; } public function getLastOutput() { return $this->resOutput; } public function getLastError() { return $this->resError; } public function syncExec($command) { $command $this->prepareExecution($command); $retVal 1$descriptorspec = array( => array("pipe""r"), => array("pipe""w"), => array("pipe""w") ); $pipes = array(); $process proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0...

Function proc_close Line: 93 Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process)

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0], $command); fclose($pipes[0]); $this->resOutput stream_get_contents($pipes[1]); fclose($pipes[1]); $this->resError stream_get_contents($pipes[2]); fclose($pipes[2]); $retVal proc_close($process)

Function strrev exec_strrev Line: 39 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/actionmodifyer.php

Size: 4.10 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 22 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/actionsdata.php

Size: 6.63 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$param'$fBody); $result $newfunc($buildParam); } return $result; } public static function setLogLevel($logLevel) { self::$logLevel $logLevel; } public static function checkRunningAction() { $result = array(); $shellAdapter = new ShellAdapter(); $execRes $shellAdapter->syncExec("sudo -u root /opt/webdir/bin/bx-process -a list -o json"); $data $shellAdapter->getLastOutput(); if($execRes) { $arData json_decode($datatrue); $result = array(); if(isset($arData["params"])...

Function strrev exec_strrev Line: 85 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/provider.php

Size: 6.41 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 24 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/serversdata.php

Size: 5.22 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 38 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/helper.php

Size: 5.33 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit php_uname Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname('s')

Function strrev exec_strrev Line: 186 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/action.php

Size: 7.33 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function(""$paramCode); if(is_callable($func)) { $res $func(); $retStr str_replace('##CODE_PARAMS:'.$paramId.'##'$res$retStr); } } } foreach ($this->freeParams as $key => $paramValue$retStr str_replace('##'.$key.'##'$paramValue$retStr); return $retStr; } public function start(array $inputParams = array()) { if(!is_array($inputParams)) throw new \Bitrix\Main\ArgumentTypeException("inputParams""array"); if(isset($this->actionParams["MODIFYERS"]) && is_array($this->action...

Function strrev exec_strrev Line: 177 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/sitesdata.php

Size: 3.13 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 80 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/scale/lib/monitoring.php

Size: 14.76 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$data'$item["DATA_FUNC"]); if(is_callable($func)) { $result $func($data); } } else { if(isset($data["calcpr"])) { $data["data"] = $data["calcpr"]; } $result = static::extractRrdValue($data); } return $result; } protected static function extractRrdValue($data) { $result false; if(isset($data["data"]) && is_array($data["data"])) { reset($data["data"]); $result current($data["data"]); } return trim($result); } protected static function getAnsibleSetup($hostname) { static $i...

Function strrev exec_strrev Line: 340 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/pizzalaroma.kz/public_html/bitrix/modules/pull/options.php

Size: 23.61 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].BX_ROOT.'/modules/pull/default_option.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/pull/ajax_hit.php

Size: 289.00 B Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/pull.request/ajax.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/pull/classes/general/pull_options.php

Size: 16.85 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 535 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].BX_ROOT.'/modules/pull/default_option.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/pull/default_option.php

Size: 1.29 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 34 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/php_interface/pull.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/antivirus.php

Size: 44.24 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 528 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/post_filter.php

Size: 6.99 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 162 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/event.php

Size: 5.49 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog($this->syslogPriority$message); } if ($this->isFileEngineActive) { if (!$message$message $this->messageFormatter->format($auditType$itemName$itemDescription); $message = static::sanitizeMessage($message); $message .= "\n"$savedInFile file_put_contents($this->filePath$messageFILE_APPEND) > 0; } return ($savedInDB || $savedInSyslog || $savedInFile); } public static function getSyslogPriorities() { return static::$syslogPriorities; } public static function getSyslogFaciliti...

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/tests/environment.php

Size: 13.68 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function posix_getpwuid Line: 487 Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid($uid);
            return 
sprintf('%s(%s)'$uid['name'], $uid['uid']);
        }

        return 
$uid;
    }

    
/**
     * Format system user group ID, e.g. $gid 0 = root(0)
     *
     * @param int $gid
     * @return string
     */
    
protected static function formatGID($gid)
    {
        if(
is_callable("posix_getgrgid"))
        {
            
$gid posix_getgrgid($gid);
            return 
sprintf('%s(%s)'$gid['name'], $gid['gid']);
        }

        return 
$gid;
    }

    protected static function 
formatFilePermissions($perms)
    {
        
// http://www.php.net/manual/e...

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/user.php

Size: 7.37 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit download_remote_code2 Line: 197 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"<?include(\$_SERVER[\"DOCUMENT_ROOT\"].\"/bitrix/modules/security/options_user_settings_1.php\")

Exploit execution Line: 197 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include(\$_SERVER[\"DOCUMENT_ROOT\"].\"/bitrix/modules/security/options_user_settings_1.php\")

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/system_information.php

Size: 8.56 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 387 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/pizzalaroma.kz/public_html/bitrix/modules/security/classes/general/iprule.php

Size: 30.43 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit execution Line: 1239 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/security_403.php")

Exploit execution Line: 976 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/admin/security_403.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/security/install/index.php

Size: 11.02 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/events.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/security/lang/ru/admin/security_antivirus.php

Size: 3.09 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 12 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/home/pizzalaroma.kz/public_html/bitrix/modules/security/lang/en/admin/security_antivirus.php

Size: 2.24 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 13 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/home/pizzalaroma.kz/public_html/bitrix/modules/security/lang/en/classes/general/tests/environment.php

Size: 5.08 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 20 Dangerous

Malware Signature (hash: 11413268)

exploit

/home/pizzalaroma.kz/public_html/bitrix/modules/security/lang/en/classes/general/tests/php_configuration.php

Size: 5.02 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 25 Dangerous

Malware Signature (hash: 11413268)

exploit

/home/pizzalaroma.kz/public_html/bitrix/modules/bitrixcloud/install/examples/bitrixcloud_backup_list_files.php

Size: 1.04 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/bitrixcloud/install/examples/bitrixcloud_backup_read_file.php

Size: 3.33 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/options.php

Size: 93.89 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 248 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php

Size: 3.15 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 49 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                
BX('https_check_result').innerHTML '&nbsp;' res['text'];

                
BX.removeClass(BX('https_check_result'), 'https_check_success');
                
BX.removeClass(BX('https_check_result'), 'https_check_fail');

                if (
res['status'] == 'ok')
                    
BX.addClass(BX('https_check_result'), 'https_check_success');
                else
                    
BX.addClass(BX('https_check_result'), 'https_check_fail');
            });
        };
        
checkHTTPS()

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/mcsecure/.description.php

Size: 280.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/mcsecure/ru/payment.php

Size: 201.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/mcsecure/en/payment.php

Size: 201.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/mcsecure/payment.php

Size: 270.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/result_rec.php

Size: 279.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/.description.php

Size: 282.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/ru/payment.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/result.php

Size: 270.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/result.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/en/payment.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/moneymail/payment.php

Size: 273.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/impexbank/.description.php

Size: 282.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/impexbank/ru/impexbank.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/ru/impexbank.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/impexbank/en/impexbank.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/en/impexbank.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/impexbank/payment.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/kreditpilot/.description.php

Size: 286.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/kreditpilot/ru/payment.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/kreditpilot/en/payment.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/kreditpilot/payment.php

Size: 276.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_la/.description.php

Size: 281.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_la/en/bill.php

Size: 193.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/en/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_la/la/bill.php

Size: 194.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/la/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_la/payment.php

Size: 275.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/liqpay/result_rec.php

Size: 1.31 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['operation_xml'])

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_ua/.description.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_ua/ru/bill.php

Size: 194.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/ru/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_ua/en/bill.php

Size: 193.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/en/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_ua/payment.php

Size: 275.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_web/result_rec.php

Size: 284.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_web/.description.php

Size: 288.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_web/ru/webmoney_web.php

Size: 219.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/ru/webmoney_web.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_web/en/webmoney_web.php

Size: 219.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/en/webmoney_web.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_web/payment.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank_new/.description.php

Size: 288.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank_new/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank_new/payment.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank_new/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_de/.description.php

Size: 281.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_de/ru/bill.php

Size: 194.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/ru/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_de/en/bill.php

Size: 193.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/en/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill_de/payment.php

Size: 275.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/post/.description.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/post/ru/post.php

Size: 187.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/ru/post.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/post/en/post.php

Size: 187.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/en/post.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/post/payment.php

Size: 262.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/z_payment/.description.php

Size: 282.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/z_payment/ru/z_payment.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/ru/z_payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/z_payment/en/z_payment.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/en/z_payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/z_payment/z_payment_result.php

Size: 290.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/z_payment_result.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/z_payment/payment.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney/.description.php

Size: 280.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney/ru/webmoney.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/ru/webmoney.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney/en/webmoney.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/en/webmoney.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney/payment.php

Size: 270.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill/.description.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill/ru/bill.php

Size: 188.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/ru/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill/en/bill.php

Size: 187.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/en/bill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/bill/payment.php

Size: 269.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex/result_rec.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex/.description.php

Size: 276.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex/ru/payment.php

Size: 197.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex/en/payment.php

Size: 197.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex/payment.php

Size: 266.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/payflow_pro/payment.php

Size: 9.77 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function exec Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arFields = array( "PS_STATUS" => (($arResult["RESULT"]==0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CLang::GetDateFormat("FULL"LANG))) ); $arResult["R...

Function exec Line: 100 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var);

                
$strOutput $arOutput[0];
                
parse_str($strOutput$arResult);

                if (
is_array($arResult) && strlen($arResult["RESULT"])>0)
                {
                    
$arFields = array(
                            
"PS_STATUS" => (($arResult["RESULT"]==0) ? "Y" "N"),
                            
"PS_STATUS_CODE" => $arResult["RESULT"],
                            
"PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"],
                            
"PS_STATUS_MESSAGE" => $arResult["PNREF"],
                            
"PS_RESPONSE_DATE" => Date(CDatabase::DateFormat...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/payflow_pro/pre_payment.php

Size: 8.22 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function exec Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arPaySysResult = array( "PS_STATUS" => (($arResult["RESULT"] == 0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_SUM" => $AMT"PS_CURRENCY" => "USD""PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CL...

Function exec Line: 96 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var);

        
$strOutput $arOutput[0];
        
parse_str($strOutput$arResult);

        if (
is_array($arResult) && strlen($arResult["RESULT"])>0)
        {
            
$arPaySysResult = array(
                    
"PS_STATUS" => (($arResult["RESULT"] == 0) ? "Y" "N"),
                    
"PS_STATUS_CODE" => $arResult["RESULT"],
                    
"PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"],
                    
"PS_STATUS_MESSAGE" => $arResult["PNREF"],
                    
"PS_SUM" => $AMT,
                    
"PS_CURRENCY" => "USD",
                    
"PS_RESP...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/payflow_pro/action.php

Size: 5.77 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function exec Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $OUTPUT_STATUS = (($arResult["RESULT"] == 0) ? "Y" "N"); $OUTPUT_STATUS_CODE $arResult["RESULT"]; $OUTPUT_STATUS_DESCRIPTION $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"]; $OUTPUT_STATUS_MESSAGE $arResult["PNREF"]; $OUTPUT_SUM $INPUT_SUM$OUTPUT_CURRENCY "USD"$OUTPUT_RESPONSE_DATE Date(CDatabase::DateFormatToPHP(CLang::...

Function exec Line: 107 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var);

    
$strOutput $arOutput[0];
    
parse_str($strOutput$arResult);

    if (
is_array($arResult) && strlen($arResult["RESULT"])>0)
    {
        
$OUTPUT_STATUS = (($arResult["RESULT"] == 0) ? "Y" "N");
        
$OUTPUT_STATUS_CODE $arResult["RESULT"];
        
$OUTPUT_STATUS_DESCRIPTION $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"];
        
$OUTPUT_STATUS_MESSAGE $arResult["PNREF"];
        
$OUTPUT_SUM $INPUT_SUM;
        
$OUTPUT_CURRENCY "USD";
        
$OUTPUT_RESPONSE_DATE Date(CDatabase::Dat...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/binom/.description.php

Size: 274.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/binom/ru/payment.php

Size: 195.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/binom/en/payment.php

Size: 195.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/binom/payment.php

Size: 264.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank/.description.php

Size: 280.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank/ru/sberbank.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/ru/sberbank.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank/en/sberbank.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/en/sberbank.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/sberbank/payment.php

Size: 270.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/oshadbank/.description.php

Size: 282.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/oshadbank/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/oshadbank/payment.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/oshadbank/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/result_rec.php

Size: 284.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/.description.php

Size: 288.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/ru/webmoney_pci.php

Size: 219.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/ru/webmoney_pci.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/result.php

Size: 276.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/result.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/en/webmoney_pci.php

Size: 219.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/en/webmoney_pci.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/webmoney_pci/payment.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex_3x/result_rec.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex_3x/.description.php

Size: 282.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex_3x/ru/payment.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex_3x/en/payment.php

Size: 203.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/en/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/yandex_3x/payment.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paycash/.description.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paycash/ru/paycash.php

Size: 199.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/ru/paycash.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paycash/en/paycash.php

Size: 199.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/en/paycash.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paycash/payment.php

Size: 268.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/worldpay/.description.php

Size: 3.71 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function system Line: 12 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

System (via http://www.worldpay.com/admin). In the new window that ";
$psDescription .= "opens you will need to scroll down to the section headed Installations and select the Configuration options button corresponding to the instId you are using.<br>";
$psDescription .= "You need to complete the following settings:<br>";
$psDescription .= "- <b>Callback URL</b><br>This should be set to the complete address to your callback URL (this file), hosted on your server.<br>";
$psDescription .= "You ...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paymaster/result_rec.php

Size: 278.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/result_rec.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paymaster/.description.php

Size: 285.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/.description.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paymaster/ru/webmoney_web.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/ru/paymaster.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paymaster/en/paymaster.php

Size: 207.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/en/paymaster.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/payment/paymaster/payment.php

Size: 272.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/payment.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/handlers/paysystem/yandexinvoice/lang/en/.description.php

Size: 952.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function system Line: 3 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/handlers/paysystem/yandex/settings/lang/en/refund.php

Size: 2.61 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function system Line: 29 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/ymarket.php

Size: 21.98 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                                
BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>').innerHTML '&nbsp;' res['text'];

                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_fail');

                                if (
res['status'] == 'ok')
                                    
BX.addClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                else
                                    
BX.addClas...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/order_new.php

Size: 275.46 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

            if (
rss["status"] == "ok")
            {
                
BX('CART_FIX').value'N';

                var 
userEl BX("user_id");
                var 
orderID '<?=$ID?>';

                
locationID rss["location_id"];
                
locationZipID rss["location_zip_id"];

                
insertHtmlResult(document.getElementById("buyer_type_change"), rss['buyertype']);
                
insertHtmlResult(document.getElementById("buyer_type_delivery"), rss['buyerdelivery']);

                <?if(
CSaleLocation::isLocationProEnabled()):?>
                    initZipHandling();
                <?endif?...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/crm.php

Size: 22.56 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 432 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/.access.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/location_edit.php

Size: 21.12 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 354 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.fform.COUNTRY_ID");
                
CHANGE_COUNTRY = eval("document.fform.CHANGE_COUNTRY");

                <?if (
$ID>0):?>
                if (parseInt(COUNTRY_LIST.selectedIndex)==0)
                {
                    CHANGE_COUNTRY.checked = false;
                }
                <?endif;?>

                if (parseInt(COUNTRY_LIST.selectedIndex)==0 <?if ($ID>0) echo "|| CHANGE_COUNTRY.checked";?>)
                {
                    SetEnabled(true);
                }
                else
                {
                    SetEnabled(false);
                }
            }
            </script>

            <select name="COUNTRY_ID" OnChange="SetContact()">
                <option value="...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/order_detail.php

Size: 153.17 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 1362 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$customOrderView)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );
                                                
BX.closeWait();

                                                if (!!
rs.STATUS_ERR && true == rs.STATUS_ERR)
                                                {
                                                    var 
obStatusErr BX('change_status_err');
                                                    if (!!
obStatusErr)
                                                    {
                                                        
obStatusErr.innerHTML rs.STATUS_ERR_MESS;
                                                        
obStatusErr.style.display 'inline-block';
                                                    }
                                                }
                                                else
                                                {
                                                    if (
BX('date_status_change') && rs['DATE_STATUS'] && rs['DATE_STATUS'].length 0)
            ...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/stat_graph_money.php

Size: 9.83 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 115 Warning

Double var technique is usually used for the obfuscation of malicious code

${$filterLine}

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/discount_edit.php

Size: 30.84 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 2
DescriptionMatch

Exploit execution Line: 143 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['CONDITIONS'])

Exploit execution Line: 188 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['ACTIONS'])

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/delivery.php

Size: 11.64 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 300 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.find_form.filter_lang");
                
filter_order_price_from = eval("document.find_form.filter_order_price_from");
                
filter_order_price_to = eval("document.find_form.filter_order_price_to");
                
f_currency = eval("document.find_form.f_currency");

                var 
iesum;
                if (
parseInt(filter_lang.selectedIndex)==0)
                {
                    
filter_order_price_from.disabled true;
                    
filter_order_price_to.disabled true;
                    
f_currency.value "";
                }
                else
                {
                    
filter_order_price_from.disa...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/yandexinvoice_settings.php

Size: 9.32 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 2
DescriptionMatch

Function proc_close Line: 95 Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process);

            
$dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId);
            if (
$dbRes->fetch())
                \
Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey));
            else
                \
Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey));
        }
        else
        {
            
$errorMsg Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIGURED');
        }

        if (
$errorMsg === '')
        {
            
$redirectUrl $APPLICATION->GetCurPa...

Function proc_open Line: 93 Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open($command$descriptorSpec$pipes);
            
$privateKey stream_get_contents($pipes[1]);
            
$return_value proc_close($process);

            
$dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId);
            if (
$dbRes->fetch())
                \
Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey));
            else
                \
Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey));
        }
        else
        {
            
$errorMsg Loc::getMessage('SALE_YANDE...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/report_construct.php

Size: 22.87 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                                
filters[i].value '';
                                            }
                                        }
                                    }
                                }
                                function ...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/discount_preset_list.php

Size: 12.69 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 35 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*close*/

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/buyers.php

Size: 15.76 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 510 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*BUYER*/

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/affiliate_calc.php

Size: 13.37 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 235 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/1c_admin_profile.php

Size: 16.50 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 110 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var cur_type = ''; if (typeof(param_" pkey "_type_" ind ") == 'string') cur_type = param_" pkey "_type_" ind ";");
    eval(
"var cur_val = ''; if (typeof(param_" pkey "_value_" ind ") == 'string') cur_val = param_" pkey "_value_" ind ";");
    eval(
"var cur_name = ''; if (typeof(param_" pkey "_name_" ind ") == 'string') cur_name = param_" pkey "_name_" ind ";");

    if(
cur_name.length 0)
    {
        
num pkey.substr(pkey.lastIndexOf('_')+1);
        
src BX("...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/affiliate_plan_edit.php

Size: 23.94 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 402 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.MODULE_ID_" cnt);
                if (!
m)
                    return;

                if (
m[m.selectedIndex].value == "catalog")
                    
ShowHideSectionBox(cnttrue);
                else
                    
ShowHideSectionBox(cntfalse);
            }


            var 
itm_id = new Object();
            var 
itm_name = new Object();

            function 
ChlistIBlock(cntn_id)
            {
                var 
max_lev itm_lev;
                var 
nex document.form1["SECTION_SELECTOR_LEVEL_" cnt "[0]"];
                var 
iBlock = eval("document.form1.SECTION_IBLOCK_ID_" cnt);
                var 
iBlockID iBlock[iBl...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/admin/report_view.php

Size: 23.12 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 305 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                            }
                                        }
                                    }
                                }
                                function 
fRewriteSelectFromArray(selectdat...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/admin/template.php

Size: 13.08 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.bsm.site.master/tools/modulechecker.php

Size: 3.04 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 119 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.bsm.site.master/tools/pushchecker.php

Size: 2.20 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 114 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.crm.site.master/tools/modulechecker.php

Size: 5.10 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 139 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.crm.site.master/tools/pushchecker.php

Size: 2.20 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 114 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.43 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.99 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/install/sample/mp3/download_private.php

Size: 4.94 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Exploit double_var2 Line: 13 Warning

Double var technique is usually used for the obfuscation of malicious code

${$arr2[0]}

Exploit execution Line: 177 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/general/order.php

Size: 94.98 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);"));
                                
$vals array_unique($vals);
                                
$val implode(","$vals);

                                if (
count($vals) <= 0)
                                    
$arSqlSearch_tmp[] = "(1 = 2)";
                                else
                                    
$arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))";
                            }
                            elseif (
$arFields[$key]["TYPE"] == "double")
                            {
                                
array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);"));
                                
$vals =...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/general/sale_report_helper.php

Size: 110.66 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 973 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/install/version.php")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } if (self::$bUsePriceTypesColumns) { foreach (self::$priceTypes as $id => $info) { if ($info['selected'] === true) { $fieldName 'PRICE_TYPE_'.$id$runtime[$fieldName] = array( 'data_type' => 'string''expression' => array('
                (SELECT '
.$DB->Concat(___dbCastIntToChar($DBType...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/general/discount.php

Size: 54.42 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:49 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval('$checkOrder='.$strUnpack.';'); if (!is_callable($checkOrder)) return false$boolRes $checkOrder($arOrder); unset($checkOrder); return $boolRes; } protected static function __ApplyActions(&$arOrder$strActions) { $applyOrder null; if (!empty($strActions)) { eval('$applyOrder='.$strActions.';'); if (is_callable($applyOrder)) $applyOrder($arOrder); } } protected static function __ConvertOldFormat($strAction, &$arFields) { global $APPLICATION$arMsg = array(); $boolResult true$arNee...

Function eval Line: 1331 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$checkOrder='.$strUnpack.';');
        if (!
is_callable($checkOrder))
            return 
false;
        
$boolRes $checkOrder($arOrder);
        unset(
$checkOrder);
        return 
$boolRes;
    }

    protected static function 
__ApplyActions(&$arOrder$strActions)
    {
        
$applyOrder null;
        if (!empty(
$strActions))
        {
            eval(
'$applyOrder='.$strActions.';');
            if (
is_callable($applyOrder))
                
$applyOrder($arOrder);
        }
    }

    protected static function 
__ConvertOldFormat($strAction, &$arFields)
    {
        global 
$APPLICATION;

        
$a...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/include.php

Size: 55.10 kB Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 769 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/include.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/reports/waybill.php

Size: 252.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/waybill.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/reports/invoice.php

Size: 252.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/invoice.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/reports/order_form.php

Size: 258.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/order_form.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/reports/factura.php

Size: 252.00 B Created: 2023-02-22 17:08:28 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/factura.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_cpcr.php

Size: 191.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_cpcr.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_ems.php

Size: 189.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_ems.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/russianpost/country.php

Size: 203.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/russianpost/country.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_russianpost.php

Size: 205.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_russianpost.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_rus_post_first.php

Size: 211.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_rus_post_first.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/cpcr/cities.php

Size: 187.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/cpcr/cities.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/cpcr/locations.php

Size: 193.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/cpcr/locations.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_rus_post.php

Size: 199.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_rus_post.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_ua_post.php

Size: 197.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_ua_post.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_kaz_post.php

Size: 199.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_kaz_post.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/delivery/delivery_pecom.php

Size: 193.00 B Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_pecom.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/internals/conversionhandlers.php

Size: 13.14 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 282 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*array*/

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/internals/product.php

Size: 12.27 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } $fieldsMap = array( 'ID' => array( 'data_type' => 'integer''primary' => true ), 'TIMESTAMP_X' => array( 'data_type' => 'integer' ), 'DATE_UPDATED' => array( 'data_type' => 'datetime''expression' => array( $DB->datetimeToDateFunction('%s'), 'TIMESTAMP_X', ) ), 'QUANTITY' => a...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/compatible/discountcompatibility.php

Size: 44.44 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$applyProduct='.$orderApplication.';'); if (is_callable($applyProduct)) $applyProduct($fields); unset($applyProduct); if (!empty($fields['DISCOUNT_RESULT'])) { self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR_DATA'] = $fields['DISCOUNT_RESULT']['BASKET']; self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR'] = self::formatDescription($fields['DISCOUNT_RESULT']); } unset($fields['DISCOUNT_RESULT']); } unset($orderApplication); } unset($discount$index); return tr...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/location/migration/migrate.php

Size: 53.98 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 1090 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/sale/lang/'.$item['LID'].'/lib/location/migration/migrate.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/location/import/compiler/compiler.php

Size: 75.72 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system('cp '.$workDir.self::STATIC_CSV_DIR.'externalservice.csv '.$workDir.'/'.self::OUTPUT_DIR);
        
system('cp '.$workDir.self::STATIC_CSV_DIR.'type.csv '.$workDir.'/'.self::OUTPUT_DIR);
    }

    private 
$currentParentGroup '';

    private function 
addItemToCSV($fName$group$item)
    {
        
$data = array(
            
'CODE' =>             $item['CODE'],
            
'PARENT_CODE' =>     $item['PARENT_CODE'],
            
'TYPE_CODE' =>         $item['TYPE_CODE']
        );

        
$data['NAME.RU.NAME'] = '';
        
$data['NAME.EN.NAME'] = '';
        
$data['NAME.UA.NAM...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/discount/preset/basepreset.php

Size: 23.29 kB Created: 2023-02-22 17:08:27 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $isPost $this->request->isPost(); $stepName $this->getStepName(); $state $this->getState(); if($stepName === $this->getFirstStepName() && !$isPost && $this->isDiscountEditing()) { $state $this->generateState($this->discount); } if($this->isRunningPrevStep()) { $stepName $state->getPrevStep(); } if($isPost && !$this->isRunningPrevStep()) { list($state$nextStep) = $this->runStep($stepName$stateself::MODE_SAVE); if($stepName != $nextStep) { $state->addStepChain($stepName); ...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/discountbase.php

Size: 153.92 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:50 Warns: 1 Dangers: 1
DescriptionMatch

Exploit nano Line: 2242 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$discount[$executeKey]($this->orderData)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($evalCode); } catch (\ParseError $e) { $this->showAdminError(); } } else { eval($evalCode); } unset($evalCode); if (!is_callable($checkOrder)) return false$result $checkOrder($this->orderData); unset($checkOrder); } else { if (!is_callable($discountLink[$executeKey])) return false$result $discountLink[$executeKey]($this->orderData); } unset($discountLink); return $result; } protected function applySaleDiscount() { $result = new ResultDiscount\Actions::clearApplyCounter(); $discoun...

/home/pizzalaroma.kz/public_html/bitrix/modules/sale/lib/delivery/extra_services/manager.php

Size: 16.09 kB Created: 2023-02-22 17:08:26 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit nano Line: 247 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$params["CLASS_NAME"]($params["ID"], $params$currency$value$additionalParams)

/home/pizzalaroma.kz/public_html/bitrix/modules/highloadblock/lib/highloadblock.php

Size: 18.69 kB Created: 2023-02-22 17:08:17 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); } $entity $entity_data_class::getEntity(); $uFields $USER_FIELD_MANAGER->getUserFields(static::compileEntityId($hlblock['ID'])); foreach ($uFields as $uField) { if ($uField['MULTIPLE'] == 'N') { $params = array( 'required' => $uField['MANDATORY'] == 'Y' ); $field $USER_FIELD_MANAGER->getEntityField($uField$uField['FIELD_NAME'], $params); $entity->addField($field); foreach ($USER_FIELD_MANAGER->getEntityReferences($uField$field) as $reference) { $entity->addField($reference...

/home/pizzalaroma.kz/public_html/bitrix/modules/bxmaker.autositemap/install/index.php

Size: 19.03 kB Created: 2023-10-28 11:29:25 Modified: 2023-11-24 20:43:50 Dangers: 4
DescriptionMatch

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

yZXF1aXJl

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

ByaW50Z

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

/home/pizzalaroma.kz/public_html/bitrix/modules/bxmaker.autositemap/include.php

Size: 67.74 kB Created: 2023-10-28 11:29:25 Modified: 2023-11-24 20:43:50 Dangers: 5
DescriptionMatch

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___1808934168(25)

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

YmFzZTY0

Sign f9dc0a55 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/options.php

Size: 11.61 kB Created: 2023-02-22 17:08:33 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 210 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/mutator.php

Size: 15.17 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page.php

Size: 4.57 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Line: 291 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/theme.php

Size: 6.25 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $code = \htmlspecialcharsbx(trim($this->fields['CODE'])); \Bitrix\Landing\Manager::setThemeId($code); $codeTypo = \htmlspecialcharsbx(trim($this->fields['CODE_TYPO'])); \Bitrix\Landing\Manager::setThemeTypoId($codeTypo)

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/headblock.php

Size: 3.17 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->isLocked()) { return; } if ($this->execCustom()) { return; } $code trim($this->fields['CODE']); if ($code != '') { self::$lastInsertedCode $code$code str_replace'<script''<script data-skip-moving="true"'$code ); \Bitrix\Main\Page\Asset::getInstance()->addString($code)

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/metayandexverification.php

Size: 1.51 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $meta trim($this->fields['META']); if (preg_match('#^<meta\s+name="yandex-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i'$meta)) { Manager::setPageView('BeforeHeadClose'$meta)

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/background.php

Size: 3.19 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $picture = \htmlspecialcharsbx(trim($this->fields['PICTURE']->getValue())); $color = \htmlspecialcharsbx(trim($this->fields['COLOR']->getValue())); $position trim($this->fields['POSITION']->getValue()); if ($picture) { if ($picture 0) { $picture = \htmlspecialcharsbx( \Bitrix\Landing\File::getFilePath($picture) ); } } if ($picture) { if ($position == 'center') { \Bitrix\Main\Page\Asset::getInstance()->addString'<style type="text/css">
                        bod...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/robots.php

Size: 1.17 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { return $this->fields['CONTENT']->getValue()

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/favicon.php

Size: 2.51 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $picture intval($this->fields['PICTURE']->getValue()); if ($picture 0) { $icons ''$sizes = array('16x16''32x32''96x96'); foreach ($sizes as $size) { list($w$h) = explode('x'$size); $file = \CFile::resizeImageGet( \Bitrix\Landing\File::getFileArray($picture), array( 'width' => $w'height' => $h ), BX_RESIZE_IMAGE_EXACT ); $ext array_pop(explode('.'$file['src'])); $icons .= '<link rel="icon" type="image/' $ext '" href="' $fil...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/fonts.php

Size: 3.94 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->fields['CODE'] = str_replace( [ 'st yle''onl oad''li nk' ], [ 'style''onload''link' ], $this->fields['CODE'] ); \Bitrix\Landing\Manager::setPageView'BeforeHeadClose'$this->fields['CODE'] ); } private static function getCustomIconFonts() { $pathTemplate24 '/bitrix/templates/'$pathTemplate24 .= Manager::getTemplateId(Manager::getMainSiteId()); return [ 'fontAwesome' => [ 'regexp' => '/fa-\w*/''css' => [$pathTemplate24 '/assets/vendor/icon-awesome/css/font-awesom...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/settings.php

Size: 7.88 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { } public static function getDataForSite($id null) { static $settings = array(); if (isset($settings[$id])) { return $settings[$id]; } $default self::getComponentsParams(); $settings[$id] = array(); if ($id) { $hooks Hook::getData$idHook::ENTITY_TYPE_SITE ); } foreach ($default as $key => $item) { if (isset($hooks['SETTINGS'][$key])) { $settings[$id][$key] = $hooks['SETTINGS'][$key]; } elseif (isset(self::$defValues[$key])) { $settings[$id][$key] = self::$defValues[$key]; } els...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/metagoogleverification.php

Size: 1.47 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $meta trim($this->fields['META']); if (preg_match('#^<meta\s+name="google-site-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i'$meta)) { Manager::setPageView('BeforeHeadClose'$meta)

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/metaog.php

Size: 4.21 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $output ''$files = []; $tags = [ 'title' => \htmlspecialcharsbx(Seo::processValue('title'$this->fields['TITLE'])), 'description' => \htmlspecialcharsbx(Seo::processValue('description'$this->fields['DESCRIPTION'])), 'image' => trim($this->fields['IMAGE']), 'type' => 'website' ]; foreach (['og''twitter'] as $rootTag) { foreach ($tags as $key => $val) { if ($key == 'image' && intval($val) > 0) { $val intval($val); if (!array_key_exists($val,...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/yacounter.php

Size: 2.55 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Manager::setPageView('AfterHeadOpen''<!-- Yandex.Metrika counter -->
<script type="text/javascript" data-skip-moving="true">
   (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)};
   m[i].l=1*new Date();k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/cssblock.php

Size: 1.73 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $cssCode trim($this->fields['CODE']); $cssFile trim($this->fields['FILE']); if ($cssCode != '') { echo '<style type="text/css">' $cssCode '</style>'; } if ($cssFile != '') { echo '<link href="' . \htmlspecialcharsbx($cssFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/gacounter.php

Size: 3.28 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { \Bitrix\Main\Page\Asset::getInstance()->addString'<!-- Global Site Tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=' 
$counter '" data-skip-moving="true"></script>
<script type="text/javascript" data-skip-moving="true">
  window.dataLayer = window.dataLayer || [];
  function gt...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/gtm.php

Size: 2.50 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Manager::setPageView('AfterHeadOpen''<!-- Google Tag Manager --><script data-skip-moving="true">' '(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({' '\'gtm.start\':new Date().getTime(),event:\'gtm.js\'});' 'var f=d.getElementsByTagName(s)[0],j=d.createElement(s),' 'dl=l!=\'dataLayer\'?\'&l=\'+l:\'\';j.async=true;' 'j.src=\'...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/copyright.php

Size: 1.08 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Line: 63 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/view.php

Size: 1.83 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $type trim($this->fields['TYPE']); if ($type == 'ltr') { Manager::setPageView'MainClass''g-pt-6 g-px-10 g-pt-30--md g-px-50--md' ); } elseif ($type == 'all') { Manager::setPageView'MainClass''g-py-6 g-px-10 g-py-30--md g-px-50--md' ); } elseif ($type == 'mobile') { Manager::setPageView'MainClass''g-max-width-768--md mx-md-auto' )

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/b24button.php

Size: 3.63 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $code = \htmlspecialcharsbx(trim($this->fields['CODE'])); if ($code != 'N') { \Bitrix\Landing\Manager::setPageView'BeforeBodyClose''<script data-skip-moving="true">
                    (function(w,d,u,b){ \'use strict\';
                    var s=d.createElement(\'script\');var r=(Date.now()/1000|0);s.async=1;s.src=u+\'?\'+r;
                    var h=d.getElementsByTagName(\'script\')[0];h.parentNode.insertBefore(s,h);
                })(window,document,\'' 
$code '\');
                </script>' 
); if ($this-...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/pixelvk.php

Size: 1.98 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Manager::setPageView('AfterHeadOpen''<script type="text/javascript" data-skip-moving="true">
                    !function(){
                        var t=document.createElement("script");
                        t.type="text/javascript",
                        t.async=!0,
                        t.src="https://vk.com/js/api/openapi.js?160",
                        t.onload=function(){VK.Retargeting.Init("' 
$counter '"),
                        V...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/pixelfb.php

Size: 2.23 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Manager::setPageView('AfterHeadOpen''<!-- Facebook Pixel Code -->
<script data-skip-moving="true">
  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=\'2.0\';n.agent=\'plbitrix\';
  n.queue=[]...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/up.php

Size: 799.00 B Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } Manager::setPageView('BodyClass''g-upper-show')

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/speed.php

Size: 2.73 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if (Landing::getEditMode()) { $this->disableSpeedConversions(); } else { $this->computeWebpackActivity(); $this->computeLazyloadActivity(); } } protected function disableSpeedConversions() { $assets Assets\Manager::getInstance(); $assets->setStandartMode(); } protected function computeWebpackActivity() { $assets Assets\Manager::getInstance(); if ($this->fields['USE_WEBPACK']->getValue() == 'Y') { $assets->setWebpackMode(); } else { $assets->setStandartMode(); } } protected function ...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/metarobots.php

Size: 1.16 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } if (\Bitrix\Landing\Landing::getPreviewMode()) { $use 'N'; } else { $use $this->fields['INDEX']->getValue(); } \Bitrix\Main\Page\Asset::getInstance()->addString'<meta name="robots" content="' . ($use != 'N' 'all' 'noindex') . '" />' )

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/metamain.php

Size: 2.42 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $title = \htmlspecialcharsbx(Seo::processValue('title'$this->fields['TITLE'])); $description Seo::processValue('description'$this->fields['DESCRIPTION']); $keywords Seo::processValue('keywords'$this->fields['KEYWORDS']); if ($title != '') { Manager::setPageTitle($title); } if ($description != '') { Manager::getApplication()->setPageProperty'description'$description ); } if ($keywords != '') { Manager::getApplication()->setPageProperty( ...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/hook/page/gmap.php

Size: 1.76 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $code ''; if ($this->fields['USE']->getValue() == 'Y') { $code = \htmlspecialcharsbx(trim($this->fields['CODE'])); } Asset::getInstance()->addString"<script defer>
                (function(){
                    'use strict';
                    //fake function, if API will loaded fasten than blocks
                    window.onGoogleMapApiLoaded = function(){}
                })();
            </script>" 
); Asset::getInstance()->addString'<script defer src="https://maps.googleapis.com/maps/api/js?key=' $code '&call...

/home/pizzalaroma.kz/public_html/bitrix/modules/landing/lib/block.php

Size: 101.08 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:50 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>' $content '<?'); } catch (\ParseError $e) { $errMessage $this::getMessageBlock([ 'MESSAGE' => Loc::getMessage('LANDING_BLOCK_MESSAGE_ERROR_EVAL') ]); if ($params['wrapper_show']) { echo '<div id="' $anchor '" class="block-wrapper' . (!$this->active ' landing-block-deactive' '') . '">' $errMessage '</div>'; } else { echo $errMessage; } } } } elseif ($this->active || $params['force_unactive']) { static $sysPages null; if ($sysPages === null) { $sysPages = array(); fore...

Sign 11413268 Line: 2424 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/home/pizzalaroma.kz/public_html/bitrix/modules/compression/include.php

Size: 3.32 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:50 Dangers: 1
DescriptionMatch

Exploit execution Line: 42 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/compression/table.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/conversion/lib/ratemanager.php

Size: 697.00 B Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit nano Line: 31 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$type['CALCULATE']($counters)

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/admin/iblock_subelement_generator.php

Size: 28.34 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 665 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/admin/iblock_subelement_edit.php

Size: 68.53 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Dangers: 5
DescriptionMatch

Exploit execution Line: 1788 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit.php")

Exploit execution Line: 609 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBlock["EDIT_FILE_BEFORE"])

Exploit execution Line: 617 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBTYPE["EDIT_FILE_BEFORE"])

Exploit execution Line: 710 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit_validator.php")

Exploit execution Line: 846 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit_action.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/admin/iblock_element_edit.php

Size: 120.48 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Dangers: 6
DescriptionMatch

Exploit execution Line: 1141 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit_action.php")

Exploit execution Line: 1891 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$customFormFile)

Exploit execution Line: 3125 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit.php")

Exploit execution Line: 717 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBlock["EDIT_FILE_BEFORE"])

Exploit execution Line: 725 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBTYPE["EDIT_FILE_BEFORE"])

Exploit execution Line: 854 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit_validator.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/classes/general/subelement.php

Size: 56.91 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.CUtil::JSEscape($this->onLoadScript).'\');';
                echo 
'</script></body></html>';
            }
            else
            {
                if(
$this->onLoadScript)
                    echo 
'<script type="text/javascript">'.$this->onLoadScript.'</script>';
                echo 
$string;
            }
            
define("ADMIN_AJAX_MODE"true);
            require(
$_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_after.php");
            die();
        }
        elseif (
$_REQUEST["mode"]=='excel')
        {
            
header("Content-Type: application/vnd.ms-excel");
            
header("Content-Dispos...

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.filter/component.php

Size: 33.07 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 70 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

Exploit double_var2 Line: 73 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PREFILTER_NAME}

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.smart.filter/component.php

Size: 29.42 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 23 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PREFILTER_NAME}

Exploit double_var2 Line: 578 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/template.php

Size: 31.88 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 3
DescriptionMatch

Exploit execution Line: 185 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 204 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.link.list/component.php

Size: 1.14 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 19 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FN}

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/rss.show/component.php

Size: 2.59 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function create_function Line: 73 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$val, $key''$val=htmlspecialcharsex($val);'));
    elseif(
$arParams["PROCESS"] == "TEXT")
        
array_walk_recursive($arResultcreate_function('&$val, $key''$val=str_replace(array("    ", "\\r\\n"), array("&nbsp;&nbsp;&nbsp;&nbsp;", "<br>"), HTMLToTxt($val));'));

    
$this->IncludeComponentTemplate()

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog/templates/.default/section.php

Size: 2.44 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog/templates/bootstrap_v4/section.php

Size: 2.46 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 74 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.sections.top/component.php

Size: 17.96 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/.default/template.php

Size: 65.43 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1115 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/bootstrap_v4/template.php

Size: 65.38 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1142 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                            '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                            '
BASKET_URL' => $arParams['BASKET_URL'],
                            '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                            '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                            '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                            '
USE_PRODUCT_QUANTITY' => 'N',
                            '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'],
                ...

/home/pizzalaroma.kz/public_html/bitrix/modules/iblock/lib/model/section.php

Size: 1.02 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 40 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($entity)

/home/pizzalaroma.kz/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.32 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 338 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/home/pizzalaroma.kz/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 30.03 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.46 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 224 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }
            if (
result['status'] == 'inprogress')
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text'];
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true;
                }
                else
                {
                    
document.getElementById(...

/home/pizzalaroma.kz/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.67 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 110 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/home/pizzalaroma.kz/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 18.87 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Dangers: 2
DescriptionMatch

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/b24connector/install/components/bitrix/b24connector.button.list/ajax.php

Size: 3.73 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()

/home/pizzalaroma.kz/public_html/bitrix/modules/seo/admin/seo_tools.php

Size: 40.09 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Dangers: 4
DescriptionMatch

Exploit execution Line: 103 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_changer_link'])

Exploit execution Line: 106 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_final'])

Exploit execution Line: 113 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_win_changer_link'])

Exploit execution Line: 116 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_win_final'])

/home/pizzalaroma.kz/public_html/bitrix/modules/subscribe/install/index.php

Size: 10.02 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 127 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/subscribe/install/events.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/kkb/KkbHelper.php

Size: 17.53 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Sign 664602fe Line: 379 Dangerous

Malware Signature (hash: 664602fe)

fopen('/home/

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/tools/iblock_subelement_generator.php

Size: 30.41 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 687 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/options.php

Size: 85.45 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 2128 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            var 
el BX(res);
            
BX(res).setAttribute('class''adm-btn');
            if (
el.bxwaiter && el.bxwaiter.parentNode)
            {
                
el.bxwaiter.parentNode.removeChild(el.bxwaiter);
                
el.bxwaiter null;
            }
            
el.disabled false;
        }
    }
</
script>
<?
}

$systemTabControl = new CAdminTabControl("tabControl2"$aTabstruetrue);

$systemTabControl->Begin();
$systemTabControl->BeginNextTab();
?><tr><td align="left"><?
$arAgentInfo = false;
$rsAgents = CAgent::GetList(array(),array...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load/cron_frame.php

Size: 3.43 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 93 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load/yandex_run.php

Size: 58.33 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 1011 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 1012 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 1013 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 1014 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer2 = htmlspecialchars($_GET["referer2"])

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load/yandex_detail.php

Size: 32.74 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 514 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['XML_DATA'])

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load/yandex_simple_run.php

Size: 12.09 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 90 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 97 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 98 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 99 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer2 = htmlspecialchars($_GET["referer2"])

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/admin/import_setup.php

Size: 61.45 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1 Dangers: 5
DescriptionMatch

Exploit execution Line: 263 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_SETUP"])

Exploit execution Line: 271 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 275 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin.php")

Exploit execution Line: 305 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_RUN"])

Exploit execution Line: 386 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var);
                            if (
intval($return_var)!=0)
                            {
                                
$strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n";
                                if (
is_array($arRetval) && !empty($arRetval))
                                {
                                    
$strErrorMessage .= implode("\n"$arRetval)."\n";
                                }
                                else
                                {
                                    
$strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n";
                                }
                            }
                        }
                    }
                }

                if (
strlen($strErrorM...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/admin/cat_store_document_edit.php

Size: 44.46 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 1088 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            if(
res['id'] > 0)
            {
                
res['quantity'] = 1;
                
obProductAdd BX('productAdd');
                if (!!
obProductAdd)
                    
obProductAdd.disabled true;
                
addRow(nullresnullarBarCodes);
            }
        }
    }

    function 
enterBarcodes(id)
    {
        var 
amount;
        if(
BX('CAT_DOC_AMOUNT_HIDDEN_'+id))
            
amount parseInt(BX('CAT_DOC_AMOUNT_HIDDEN_'+id).value10);
        else
            
amount 0;
        if(
isNaN(amount))
            
amount 0;
        
maxId amount;

        var
            
content BX.create('DIV', {
                
props: {i...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/admin/cat_product_search.php

Size: 9.63 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 153 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("window.opener.document.<?= $form_name ?>.<?= $field_name ?>");
        if(
el)
            
el.value id;
        <?if (
strlen($field_name_name) > 0):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_name ?>");
            if(el)
                el.value = name;
        <?endif;?>
        <?if (strlen($field_name_url) > 0):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_url ?>");
            if(el)
                el.value = url;
        <?endif;?>
        <?if (strlen($alt_name) > 0):?>
            el = window.opener.document.getEleme...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/admin/export_setup.php

Size: 63.75 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1 Dangers: 5
DescriptionMatch

Exploit execution Line: 263 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 267 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_SETUP"])

Exploit execution Line: 272 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin.php")

Exploit execution Line: 302 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_RUN"])

Exploit execution Line: 377 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var);
                            if (
intval($return_var)!=0)
                            {
                                
$strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n";
                                if (
is_array($arRetval) && !empty($arRetval))
                                {
                                    
$strErrorMessage .= implode("\n"$arRetval)."\n";
                                }
                                else
                                {
                                    
$strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n";
                                }
                            }
                        }
                    }
                }

                if (
strlen($strErrorM...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/admin/cat_discount_edit.php

Size: 25.92 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 87 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['CONDITIONS'])

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/load/cron_frame.php

Size: 3.27 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 86 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/index.php

Size: 29.23 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 218 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/install/events/set_events.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/admin/cat_product_list.php

Size: 126.00 B Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_list_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/admin/cat_section_admin.php

Size: 129.00 B Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/admin/cat_section_edit.php

Size: 128.00 B Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_edit.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/admin/cat_product_admin.php

Size: 129.00 B Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/install/admin/cat_product_edit.php

Size: 128.00 B Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_edit.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load_import/commerceml_run.php

Size: 30.33 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/php_interface/include/1c_mutator.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load_import/cron_frame.php

Size: 3.51 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 96 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/load_import/commerceml_g_run.php

Size: 61.72 kB Created: 2023-02-22 17:08:30 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 33 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/php_interface/include/1c_mutator.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/general/catalog_import.php

Size: 10.27 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 322 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/general/discount.php

Size: 120.22 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

eval('return '.$strUnpack.';'); } protected function __ConvertOldConditions($strAction, &$arFields) { $strAction ToUpper($strAction); if (!is_set($arFields'CONDITIONS')) { $arConditions = array( 'CLASS_ID' => 'CondGroup''DATA' => array( 'All' => 'AND''True' => 'True', ), 'CHILDREN' => array(), ); $intEntityCount 0$arIBlockList self::__ConvertOldOneEntity($arFields'IBLOCK_IDS'); if (!empty($arIBlockList)) { $intEntityCount++; } $arSectionList self::__ConvertOldOneEntity($arField...

Function eval Line: 3343 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('return '.$strUnpack.';');
    }

    protected function 
__ConvertOldConditions($strAction, &$arFields)
    {
        
$strAction ToUpper($strAction);
        if (!
is_set($arFields'CONDITIONS'))
        {
            
$arConditions = array(
                
'CLASS_ID' => 'CondGroup',
                
'DATA' => array(
                    
'All' => 'AND',
                    
'True' => 'True',
                ),
                
'CHILDREN' => array(),
            );
            
$intEntityCount 0;

            
$arIBlockList self::__ConvertOldOneEntity($arFields'IBLOCK_IDS');
            if (!empty(
$arIBlockList))
            {
                
$intEntityCount...

/home/pizzalaroma.kz/public_html/bitrix/modules/catalog/general/catalog_export.php

Size: 10.15 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Exploit execution Line: 315 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/modules/report/install/components/bitrix/report.view/templates/admin/template.php

Size: 54.95 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/home/pizzalaroma.kz/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/.default/template.php

Size: 40.31 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/pizzalaroma.kz/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/admin/template.php

Size: 40.04 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/pizzalaroma.kz/public_html/bitrix/modules/report/lib/internals/controller.php

Size: 15.24 kB Created: 2023-02-22 17:08:35 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } $action $this->getAction(); if( $this->processBeforeAction($action) === true && $this->triggerOnBeforeAction($action) === true ) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected functio...

/home/pizzalaroma.kz/public_html/bitrix/modules/perfmon/admin/perfmon_db_server.php

Size: 31.60 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 630 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/pizzalaroma.kz/public_html/bitrix/modules/perfmon/admin/perfmon_row_edit.php

Size: 17.01 kB Created: 2023-02-22 17:08:34 Modified: 2023-11-24 20:43:51 Warns: 1
DescriptionMatch

Function eval Line: 36 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$tokens[$pos][1].";");
            
$pos++;
        }
        elseif (
$tokens[$pos][0] === T_LNUMBER || $tokens[$pos][0] === T_DNUMBER || $tokens[$pos][0] === T_CONSTANT_ENCAPSED_STRING)
        {
            
$result = eval("return ".$tokens[$pos][1].";");
            
$pos++;
        }
        elseif (
$tokens[$pos][0] === T_ARRAY)
        {
            
$pos++;
            while (isset(
$tokens[$pos]) && $tokens[$pos][0] === T_WHITESPACE)
                
$pos++;

            if (
$tokens[$pos][0] !== "(")
                return;
            else
                
$pos++;

            
$result = array();
            while (
true)
            {
                ...

/home/pizzalaroma.kz/public_html/bitrix/modules/search/default_option.php

Size: 742.00 B Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:51 Dangers: 1
DescriptionMatch

Sign b236d073 Line: 4 Dangerous

Malware Signature (hash: b236d073)

/*;*/

/home/pizzalaroma.kz/public_html/bitrix/modules/intelma.comingsoon/include.php

Size: 424.00 B Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 14 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/intelma.comingsoon/comingsoon.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/options.php

Size: 7.32 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 47 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/install/components/bitrix/sender.message.editor/templates/.default/template.php

Size: 9.66 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit nano Line: 154 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$option['view']()

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/install/index.php

Size: 12.13 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 186 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sender/install/events.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/lib/connector/basefilter.php

Size: 7.09 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit nano Line: 77 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$field['sender_segment_callback']($field)

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querydata.php

Size: 3.52 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($query); } private static function prepare(Entity\Query $query$dataTypeId null) { $fields self::getSelectFields(); foreach ($fields as $alias => $field) { if (is_numeric($alias)) { $alias ''; } $query->addSelect($field$alias); } return Helper::prepareQuery($query$dataTypeId); } private static function exec(Entity\Query $query) { $result $query->exec(); $result->addFetchDataModifier( function ($data) { { if (isset($data['EMAIL_MAILING']) && $data['EMAIL_MAILING']) { $data['EMAI...

/home/pizzalaroma.kz/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querycount.php

Size: 5.23 kB Created: 2023-02-22 17:08:38 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($query$dataTypeId); } public static function getCount(Entity\Query $query$dataTypeId null) { self::prepare($query$dataTypeId); return self::exec($query$dataTypeId); } private static function exec(Entity\Query $query$dataTypeId null) { $result = array(); $resultDb Helper::prepareQuery($query$dataTypeId)->exec(); while ($row $resultDb->fetch()) { $ignoredTypes = []; foreach (self::getTypes() as $typeId => $field) { $fieldName $field['COLUMN_ALIAS'] ? $field['COLUMN_ALIAS...

/home/pizzalaroma.kz/public_html/bitrix/modules/bitrix.sitecorporate/install/wizards/bitrix/corp_furniture/scripts/utils.php

Size: 12.37 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Dangerous

Encoded Function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);')); return $arWizardTemplates; } function GetTemplatesPath($path) { $templatesPath $path."/templates"; if (file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID)) $templatesPath .= "/".LANGUAGE_ID; return $templatesPath; } function GetServices($wizardPath$serviceFolder ""$arFilter = Array()) { $arServices = Array(); $wizardPath rtrim($wizardPath"/"); $serviceFolder rtrim($serviceFolder"/"); if (LANGU...

Function create_function Line: 56 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);'));
        return 
$arWizardTemplates;
    }

    function 
GetTemplatesPath($path)
    {
        
$templatesPath $path."/templates";

        if (
file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID))
            
$templatesPath .= "/".LANGUAGE_ID;

        return 
$templatesPath;
    }

    function 
GetServices($wizardPath$serviceFolder ""$arFilter = Array())
    {
        
$arServices = Array();

        
$wizardPath rtrim($wizardPath"/");
        
$serviceFolder rtrim($se...

/home/pizzalaroma.kz/public_html/bitrix/modules/bitrix.sitecorporate/install/wizards/bitrix/corp_furniture/scripts/template.php

Size: 14.21 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/socialservices/classes/general/authmanager.php

Size: 45.38 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Dangers: 2
DescriptionMatch

Exploit execution Line: 1603 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST[self::OAUTH_PACK_PARAM])

Exploit nano Line: 193 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$service["CLASS"]()

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/classes/general/forum_new.php

Size: 84.64 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=intval(\$item);"));
                
$vals array_unique($vals);
                
$val implode(","$vals);
            }
            elseif (
$type == "double")
            {
                
array_walk($valscreate_function("&\$item""\$item=doubleval(\$item);"));
                
$vals array_unique($vals);
                
$val implode(","$vals);
            }
            elseif (
$type == "datetime")
            {
                
array_walk($valscreate_function("&\$item""\$item=\"'\".\$GLOBALS[\"DB\"]->CharToDateFunction(\$GLOBALS[\"DB\"]->ForSql(\$item), \"FULL\").\"'\";"...

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/install/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/install/components/bitrix/forum.topic.active/component.php

Size: 18.38 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 11 Warning

Double var technique is usually used for the obfuscation of malicious code

${$s}

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/install/components/bitrix/forum.topic.list/component.php

Size: 23.88 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 244 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/install/components/bitrix/forum.index/component.php

Size: 18.80 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 111 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/mail/mail.php

Size: 20.34 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Dangers: 2
DescriptionMatch

Exploit execution Line: 649 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/forum/lang/'.$lang.'/mail/mail.php')

Exploit execution Line: 652 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/forum/lang/en/mail/mail.php')

/home/pizzalaroma.kz/public_html/bitrix/modules/forum/include.php

Size: 72.09 kB Created: 2023-02-22 17:08:29 Modified: 2023-11-24 20:43:52 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 2133 Warning

Double var technique is usually used for the obfuscation of malicious code

${$sOrderVar}

Exploit double_var2 Line: 2136 Warning

Double var technique is usually used for the obfuscation of malicious code

${$sOrderVarE}

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/template.php

Size: 21.58 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 242 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/micro/template.php

Size: 4.46 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.comment.list/templates/.default/template.php

Size: 3.61 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 8 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.popular_blogs/component.php

Size: 5.77 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function create_function Line: 100 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["VIEWS"] == $b["VIEWS"]) { if($a["NUM_COMMENTS"] < $b["NUM_COMMENTS"]) return 1; elseif($a["NUM_COMMENTS"] > $b["NUM_COMMENTS"]) return -1; else return 0;} return ($a["VIEWS"] < $b["VIEWS"])? 1 : -1;'));

        
$i 0;
        foreach(
$arBlogs as $blogID => $info)
        {
            if(
$i >= $arParams["BLOG_COUNT"] && IntVal($arParams["BLOG_COUNT"]) > 0)
                continue;
            
$arBlog CBlog::GetByID($blogID);
            
$arBlog CBlogTools::htmlspecialcharsExArray($arBlog);
            
$arBlog["BlogUser"...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/template.php

Size: 30.17 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 3
DescriptionMatch

Exploit execution Line: 134 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 23 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php

Size: 15.25 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function eval Line: 210 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.edit/.default/template.php

Size: 25.44 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.comment/.default/template.php

Size: 21.68 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/template.php

Size: 23.87 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/template.php

Size: 21.46 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function eval Line: 89 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/install/index.php

Size: 20.20 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Dangers: 1
DescriptionMatch

Exploit execution Line: 406 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/blog/install/events/set_events.php")

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/general/blog.php

Size: 62.50 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);"));
                                
$vals array_unique($vals);
                                
$val implode(","$vals);

                                if (
count($vals) <= 0)
                                    
$arSqlSearch_tmp[] = "(1 = 2)";
                                else
                                    
$arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))";
                            }
                            elseif (
$arFields[$key]["TYPE"] == "double")
                            {
                                
array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);"));
                                
$vals =...

/home/pizzalaroma.kz/public_html/bitrix/modules/blog/general/blog_user.php

Size: 23.00 kB Created: 2023-02-22 17:08:16 Modified: 2023-11-24 20:43:52 Warns: 2
DescriptionMatch

Function create_function Line: 274 Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);"));

                
$dbUserGroups CBlogUserGroup::GetList(
                    array(),
                    array(
"ID" => $arGroups"BLOG_ID" => $blogID),
                    
false,
                    
false,
                    array(
"ID")
                );
                
$arGroups = array();
                while (
$arUserGroup $dbUserGroups->Fetch())
                    
$arGroups[] = IntVal($arUserGroup["ID"]);

                if (
$action == BLOG_ADD)
                    
$arCurrentGroups CBlogUser::GetUserGroups($ID$blogID""$selectType);

                foreach(
$arGroups as $val)
                {
                    if (
$val...

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);"));

                
$dbUserGroups CBlogUserGroup::GetList(
                    array(),
                    array(
"ID" => $arGroups"BLOG_ID" => $blogID),
                    
false,
                    
false,
                    array(
"ID")
                );
                
$arGroups = array();
                while (
$arUserGroup $dbUserGroups->Fetch())
                    
$arGroups[] = IntVal($arUserGroup["ID"]);

                if (
$action == BLOG_ADD)
                    
$arCurrentGroups CBlogUser::GetUserGroups($ID$blogID""$selectType);

                foreach(
$arGroups as $val)
                {
                    if (
$val...

/home/pizzalaroma.kz/public_html/bitrix/coupon_activation.php

Size: 16.67 kB Created: 2023-02-22 17:08:39 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 148 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/home/pizzalaroma.kz/public_html/bitrix/backup/index.php

Size: 80.00 B Created: 2023-03-16 13:45:15 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 1 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/home/pizzalaroma.kz/public_html/bitrix/admin/cat_product_list.php

Size: 126.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_list_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/admin/cat_section_admin.php

Size: 129.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/admin/cat_section_edit.php

Size: 128.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_edit.php")

/home/pizzalaroma.kz/public_html/bitrix/admin/cat_product_admin.php

Size: 129.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_admin.php")

/home/pizzalaroma.kz/public_html/bitrix/admin/cat_product_edit.php

Size: 128.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_edit.php")

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/admin_info/index.php

Size: 2.18 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/probki/.description.php

Size: 142.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.description.php')

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/probki/.parameters.php

Size: 102.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.parameters.php')

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/probki/index.php

Size: 98.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/index.php')

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/admin_security/index.php

Size: 4.50 kB Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/version.php")

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/weather/.description.php

Size: 143.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.description.php')

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/weather/.parameters.php

Size: 103.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.parameters.php')

/home/pizzalaroma.kz/public_html/bitrix/gadgets/bitrix/weather/index.php

Size: 99.00 B Created: 2023-02-22 17:07:59 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/index.php')

/home/pizzalaroma.kz/public_html/bitrix/php_interface/include/sale_payment/kkb/KkbHelper.php

Size: 17.53 kB Created: 2023-02-22 17:08:39 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Sign 664602fe Line: 379 Dangerous

Malware Signature (hash: 664602fe)

fopen('/home/

/home/pizzalaroma.kz/public_html/bitrix/php_interface/include/catalog_import/cron_frame.php

Size: 3.51 kB Created: 2023-02-22 17:08:39 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 96 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/home/pizzalaroma.kz/public_html/bitrix/php_interface/include/catalog_export/cron_frame.php

Size: 3.43 kB Created: 2023-02-22 17:08:39 Modified: 2023-11-24 17:24:58 Dangers: 1
DescriptionMatch

Exploit execution Line: 93 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)