PHP REQUEST Exploit [P0007]
Posted: 08 Jul 2014, 16:18
hello and first of all congraz for your great software!
today i noticed something strange in a account. the cxs scan returned the following
Scanning /home/xxxxxxx:
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/libraries/joomla/application/web/info.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/libraries/joomla/filter/alias.php'
# Skipped - too many resources: 17593 ( > filemax=10000):
'/home/xxxxxxx/public_html/modules/mod_news_pro_gk4/cache'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/plugins/system/utf.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/plugins/system/gk_recaptcha/recaptcha/sql.php'
# Script version check [OLD] [Joomla Modules Anywhere Ext v1.13.3 < v3.4.3]:
'/home/xxxxxxx/public_html/plugins/system/modulesanywhere/'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/templates/gk_sporter/lib/framework/gk.parser.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/templates/gk_sporter/lib/menu/GKHandheld.php'
i tried to open the file via ssh and edit it to see the malicious code, but the files are empty and only a "<?php" tag is inside them.
is that normal?
today i noticed something strange in a account. the cxs scan returned the following
Scanning /home/xxxxxxx:
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/libraries/joomla/application/web/info.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/libraries/joomla/filter/alias.php'
# Skipped - too many resources: 17593 ( > filemax=10000):
'/home/xxxxxxx/public_html/modules/mod_news_pro_gk4/cache'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/plugins/system/utf.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/plugins/system/gk_recaptcha/recaptcha/sql.php'
# Script version check [OLD] [Joomla Modules Anywhere Ext v1.13.3 < v3.4.3]:
'/home/xxxxxxx/public_html/plugins/system/modulesanywhere/'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/templates/gk_sporter/lib/framework/gk.parser.php'
# Known exploit = [Fingerprint Match] [PHP REQUEST Exploit [P0007]]:
'/home/xxxxxxx/public_html/templates/gk_sporter/lib/menu/GKHandheld.php'
i tried to open the file via ssh and edit it to see the malicious code, but the files are empty and only a "<?php" tag is inside them.
is that normal?