View Single Post
Old 04-03-2005, 07:08 AM  
AcidMax
Confirmed User
 
Join Date: May 2002
Location: MI
Posts: 1,827
As everyone else has said, it looks to see if it registers the variables globally (ie., takes a query string like ?info=123123 and sets it to $info automatically. If not, the extract function does so, then he is connecting to a db (and could easily pass $user,$pass,$host variables to connect right to your database, same with a $query string, for example:

He could send a post request with the variables needed..

<input type="user" value="mysql_username">
<input type="pass value="mysql_pass">
<input type="host" value="mysql_host">
<input type="query" value="SELECT * FROM your_users_table">

It would then return all your data in a tab delimited format when he submitted it. It its a HUGE backdoor to your db and to ANY db on your system as long as he has a user/pass for it. For that matter it could access any DB in the world as long as it was allowing your host to connect to the remote DB. It could even be used to hide their tracks if they were a hacker. Throw that on someone else's server and use it to gain access to another person's db so they don track it down. Its just an all around BAD script.
__________________
Latest MMA news. http://www.mmawrapup.com

Last edited by AcidMax; 04-03-2005 at 07:10 AM..
AcidMax is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote