On Thu, 26 May 2016, RW wrote:

I noticed that Bayes is picking-up on very strong tokens from "eval" and
"code" in headers like this:

  X-PHP-Originating-Script: 1013:global.php(1938) : eval()'d code

The "eval()'d code" part is in just over 2% of my spam, but it's
never occurred in a single ham in my corpus.

It doesn't do too well in masscheck:

http://ruleqa.spamassassin.org/20160528-r1745852-n/__PHP_ORIG_SCRIPT_EVAL/detail

The spams seem to be coming from exploited web-servers, and I'm
wondering if it might be a symptom of the exploit.


--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  The more you believe you can create heaven on earth
  the more likely you are to set up guillotines in the public square
  to hasten the process.                              -- James Lileks
-----------------------------------------------------------------------
 Tomorrow: Memorial Day - honor those who sacrificed for our liberty

Reply via email to