Forum Moderators: phranque
I need someone to tell me what this is? I'm receiving these in my mail box (many at the same time), however only from this server. I have replaced the original url with "mywebsite.com". I'm not sure where this is happening? Is this a virus on the server?
skqyodc@mywebsite.com
skqyodc@mywebsite.com
skqyodc@mywebsite.com Content-Type: multipart/mixed; boundary=\"===============1701036387==\" MIME-Version: 1.0 Subject: b2eae383 To: skqyodc@mywebsite.com.com bcc: mhkoch321@aol.com From: skqyodc@mywebsite.com.com This is a multi-part message in MIME format. --===============1701036387== Content-Type: text/plain; charset=\"us-ascii\" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit idbfu --===============1701036387==-- , skqyodc@mywebsite.com
skqyodc@mywebsite.com
From what I can tell the attempts made seem to be an automated process coming from multiple IP addresses from various parts of the world. You need to make sure your mail scripts do not allow headers to be inserted. For my contact page form I have hardcoded all the headers (subject, to, from) into the script. Since it can't inject it's headers all it can do is annoy me with the resulting garbage emails. If you need to allow the visitor to change a mail header then make sure and strip all newlines (\r and \n) from the inputs. You could also try checking for "bcc:" and not sending the email if it finds it.
$variable1 = str_replace("\n","",$variable1);
$variable1 = str_replace("\r","",$variable1);
$variable2 = str_replace("\n","",$variable2);
$variable2 = str_replace("\r","",$variable2);
etc...
Or you could create a function and check the variables with it:
function check_input($in) {
$out = str_replace(array("\n","\r"),"",$in);
// Put any other filtering you need here
return $out;
}
$variable1 = check_input($variable1);
$variable2 = check_input($variable2);
etc…
You would still receive the garbage emails but they wouldn't be able to exploit your server. You could also put some code on the server to detect and not send garbage emails. Something like checking each variable for "bcc:" and killing the script without emailing if it finds it. The PHP function stristr could be used for this.