Support Forum

Please note that this forum is only available to you in read only mode. In order to contribute to this conversation you will need to renew your subscription.

Suspect file content involving callEval($env)

zentoolsIf you use Zentools please post a review at the Joomla! Extensions Directory.

I recently used myjoomla.com to audit a new site installation, test2.chigov.com.

The audit reported "suspect content of files" as follows.

/templates/responsive2/zengrid/libs/lessc/Less.php
There are 10275 lines in this file, here are the suspect ones to review:
Line: 5056
public function callEval($env) {
Line: 7204
return $detachedRuleset->callEval($env);

/templates/responsive2/zengrid/libs/lessc/lib/Less/Tree/DetachedRuleset.php
There are 31 lines in this file, here are the suspect ones to review:
Line: 26
return $detachedRuleset->callEval($env);

/templates/responsive2/zengrid/libs/lessc/lib/Less/Tree/RulesetCall.php
There are 45 lines in this file, here are the suspect ones to review:
Line: 36
public function callEval($env) {

Should I be concerned about this report?

Jim Nanczek
  • glow's Avatar
  • glow
  • 3 Month Basic
  • 195 posts
  • Karma: 0
The administrator has disabled public write access.
This functions are just a part of the libs used int he framework. The scanner is getting triggered by the word eval() which is a php / js function that is commonly used in hacking scripts but these functions are ok here.

Thanks
  • Anthony Olsen's Avatar
  • Anthony Olsen
  • LIfetime Developer - Big Bamboo
  • 23925 posts
  • 788 Thanks
  • Karma: 433
The administrator has disabled public write access.
Thanks again.

Jim
  • glow's Avatar
  • glow
  • 3 Month Basic
  • 195 posts
  • Karma: 0
The administrator has disabled public write access.
Cheers
Jim
  • manh's Avatar
  • manh
  • Moderator
  • 45248 posts
  • 2106 Thanks
  • Karma: 603
The administrator has disabled public write access.

zentoolsIf you use Zentools please post a review at the Joomla! Extensions Directory.

Happy Campers