I've been given the task to locate the source of a recurring exploit. It's an iframed js exploit of some sort. AVG calls it "Exploit Javascript Obfuscation (Type 1938)" that keeps showing up on the main page of a site.
Site passwords have been changed
I've been able to determine the iframe disappears when clearing the cache on the site. The site was built on some old CMS that's no longer supported so it's no wonder there aren't more holes in it. The CMS also has some sort of export to html function where, from the admin panel, you can export your site's pages to static html files. Once I use this function, the iframe code shows up in these static files. The actual templates are kept in the mysql database and when viewing the html code in the database field, the iframe code is not present.
So, exploit code is present in cached pages, not fresh ones.. and .. code gets somehow injected upon exporting site pages to static html. I'm just about to edit those and ditch the CMS but I don't really have the time to rewrite all of the image, css, jquery file paths so basically does anyone have any idea how this is happening?
Site passwords have been changed
I've been able to determine the iframe disappears when clearing the cache on the site. The site was built on some old CMS that's no longer supported so it's no wonder there aren't more holes in it. The CMS also has some sort of export to html function where, from the admin panel, you can export your site's pages to static html files. Once I use this function, the iframe code shows up in these static files. The actual templates are kept in the mysql database and when viewing the html code in the database field, the iframe code is not present.
So, exploit code is present in cached pages, not fresh ones.. and .. code gets somehow injected upon exporting site pages to static html. I'm just about to edit those and ditch the CMS but I don't really have the time to rewrite all of the image, css, jquery file paths so basically does anyone have any idea how this is happening?