Menu
Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1
  • 2

TOPIC: Hosting company detects php.exe.globals malware in SuiteCRM file

Hosting company detects php.exe.globals malware in SuiteCRM file 4 months 3 weeks ago #78250

  • amariussi
  • amariussi's Avatar
  • Offline
  • SuiteCRM Is My Life
  • Posts: 1308
  • Thank you received: 288
  • Karma: 66
@Dillon-Brown please don't misunderstand me. I agree in full with your comments and I also think that using composer is a big time saver for SuiteCRM (and increases the overall quality).
The administrator has disabled public write access.

Hosting company detects php.exe.globals malware in SuiteCRM file 4 months 3 weeks ago #78308

  • Dillon-Brown
  • Dillon-Brown's Avatar
  • Offline
  • Administrator
  • Posts: 203
  • Thank you received: 73
  • Karma: 15
@amariussi, no worries, I appreciate the discussion :). As a temporary solution I've removed these files from the installers and added them to the files_to_remove part of the upgrade process, this won't stop anyone from re-downloading them when running composer update though.....


I'm currently looking why the elastic-search is triggering this malicious file warning, I think I've narrowed it down to SiteLock Website Security but this would need to be resolved on their end or the elastic-search guys. It's possible we might just need to remove it from composer and manually include it without the tests directory.
The administrator has disabled public write access.
The following user(s) said Thank You: amariussi
  • Page:
  • 1
  • 2
Time to create page: 0.057 seconds
Powered by Kunena Forum