Hacked? Weird zend encoded file on my server

Discussion in 'Security' started by jkashu, Jun 27, 2009.

  1. #1
    I found a weird file on a client's server while making website updates. The website is just a static html site except for a site contact us form with php (no file uploads or anything)..the contact us form writes to a text file.

    Anyway, the weird file was Zend encoded... using showmycode.com i decoded it. the result was:



    <?php
    if ( getenv( "QUERY_STRING" ) == "delete" )
    {
        header( "Location: http://lesbiansportal.imess.net/remove.html" );
    }
    else
    {
        header( "Location: http://lesbiansportal.imess.net/" );
    }
    ?>
    PHP:

    Thoughts? Nothing else is weird on the site and looking at Awstats, no one has ever gone to this page.
     
    jkashu, Jun 27, 2009 IP
  2. thr3146

    thr3146 Active Member

    Messages:
    182
    Likes Received:
    7
    Best Answers:
    0
    Trophy Points:
    58
    #2
    does it re-direct?...try clearing cache and see
     
    thr3146, Jun 27, 2009 IP
  3. thr3146

    thr3146 Active Member

    Messages:
    182
    Likes Received:
    7
    Best Answers:
    0
    Trophy Points:
    58
    #3
    Does it re-direct?...try clearing cache and see, may be seeing the old page.
     
    thr3146, Jun 27, 2009 IP
  4. jkashu

    jkashu Peon

    Messages:
    39
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #4
    the page redirects to the lesbianportal site. i don't know what would happen if I added ?delete to the url
     
    jkashu, Jun 27, 2009 IP
  5. SteveWh

    SteveWh Member

    Messages:
    74
    Likes Received:
    3
    Best Answers:
    0
    Trophy Points:
    48
    #5
    Check FTP log for unauthorized FTP accesses. Check HTTP log for RFI attacks that might have injected code into pages.
     
    SteveWh, Jun 29, 2009 IP
  6. SSANZ

    SSANZ Peon

    Messages:
    861
    Likes Received:
    10
    Best Answers:
    0
    Trophy Points:
    0
    #6
    Find the vulnerability first otherwise your going to be running around in circles.
     
    SSANZ, Jun 29, 2009 IP