Virusdie reports infected file: tar.php
-
Hello,
Although this might probably be a false positive I prefer reporting it here in order to avoid further issues.
One site that is protected by Virusdie got this alert for the file tar.php located at wp-content/plugins/backwpup/vendor/pear/archive_tar/Archive/
Line 1770:
private function _maliciousFilename($file) { if (strpos($file, 'phar://') === 0) { return true; } if (strpos($file, '/../') !== false) { return true; }
Drupal.CVE.Core-2020-013
Threat Danger Level: 9/10
Status: malware
Automatic cleaning: not available
Malware highlighting: availableDrupal CMS critical vulnerability. Arbitrary PHP code execution is possible if Drupal is configured to allow .tar, .tar.gz, .bz2, or .tlz file uploads and processes them. Versions: < 7.75, 8.8.12, 8.9.10, 9.0.9. File: modules/system/system.tar.inc, vendor/pear/archive_tar/Archive/Tar.php. Type: Remote code execution. Details: https://www.drupal.org/sa-core-2020-013 . To fix vulnerability update CMS to the latest version in the branch: https://www.drupal.org/project/drupal/releases/ . If you are using PEAR Archive_Tar library separately from Drupal, download the update from the developer’s website: https://pear.php.net/package/Archive_Tar .
If this is indeed a false positive, maybe contact Virusde directly in order to whitelist your files.
Thanks!
- The topic ‘Virusdie reports infected file: tar.php’ is closed to new replies.