04-14-2023, 10:08 PM
I need some help this is the 2nd time this has happened and its annoying. My server got infect with wordpress and well I patched wordpress but now I cant log into my panel. All i get is a blank page. Can some one please post the code so I can log into my panel.my url is http://brokendesignhosting.info/ehcp/
Also i ran a script to look for back door scripts and got this. DOnt mind shell.php Can someone pin point something.
./ehcp/webmail2/.htaccess contains RewriteRule - check it manually for malicious redirects.
./ehcp/config/adodb/adodb-time.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-mysqli.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-mysql.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-pdo_mysql.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb-xmlschema.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/session/crypt.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/config/adodb/session/old/crypt.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/config/adodb/adodb-xmlschema03.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/datadict/datadict-firebird.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb-datadict.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb.inc.php MATCHES REGEX: /system *\(/i
./ehcp/config/adodb/adodb.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/dbutil.php MATCHES REGEX: /passthru *\(/i
./ehcp/webmail2/program/include/rcube_ldap.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_vcard.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcmail.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_imap.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_template.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/webmail/contrib/decrypt_headers.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/src/options_highlight.php MATCHES REGEX: /c99/i
./ehcp/webmail/themes/classic_blue.php MATCHES REGEX: /c99/i
./ehcp/webmail/themes/simple_green2.php MATCHES REGEX: /c99/i
./ehcp/webmail/functions/strings.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/mime.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/auth.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/imap_general.php MATCHES REGEX: /`.+`/
./ehcp/webmail/plugins/fortune/fortune_functions.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/classapp.php MATCHES REGEX: /passthru *\(/i
./ehcp/classapp.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/classapp.php MATCHES REGEX: /system *\(/i
./ehcp/classapp.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/languages/tc.inc.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/modules/jupload/jupload.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/net2ftp/includes/filesystem.inc.php MATCHES REGEX: /passthru *\(/i
./ehcp/net2ftp/includes/pclzip.lib.php MATCHES REGEX: /system *\(/i
./ehcp/net2ftp/includes/authorizations.inc.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/net2ftp/plugins/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/geshi/geshi/apache.php contains RewriteRule - check it manually for malicious redirects.
./ehcp/net2ftp/plugins/geshi/geshi/apache.php contains AddHandler - make sure it does not make ordinary files like images executable.
./ehcp/net2ftp/plugins/geshi/geshi/vbnet.php contains AddHandler - make sure it does not make ordinary files like images executable.
./shell.php MATCHES REGEX: /edoced_46esab/i
./shell.php MATCHES REGEX: /system *\(/i
./shell.php MATCHES REGEX: /`.+`/
./shell.php MATCHES REGEX: /hacked by /i
./shell.php MATCHES REGEX: /web[\s-]*shell/i
./shell.php MATCHES REGEX: /c99/i
./shell.php MATCHES REGEX: /r57/i
./shell.php MATCHES REGEX: /gooqle/i
./shell.php MATCHES REGEX: /_analist/i
./shell.php MATCHES REGEX: /anaiytics/i
./shell.php contains RewriteRule - check it manually for malicious redirects.
./shell.php contains AddHandler - make sure it does not make ordinary files like images executable.
./ehcp/net2ftp/modules/help/03-administrator.html MATCHES REGEX: /`.+`/
./ehcp/webmail2/program/lib/imap.inc MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/main.inc MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/js/jquery-1.3.min.js MATCHES REGEX: /`.+`/
./ehcp/webmail2/program/js/tiny_mce/tiny_mce_src.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/tiny_mce.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/themes/advanced/js/color_picker.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/utils/validate.js MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/fckeditor/fckconfig.js MATCHES REGEX: /c99/i
./ehcp/net2ftp/plugins/tinymce/tiny_mce_src.j
Also i ran a script to look for back door scripts and got this. DOnt mind shell.php Can someone pin point something.
./ehcp/webmail2/.htaccess contains RewriteRule - check it manually for malicious redirects.
./ehcp/config/adodb/adodb-time.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-mysqli.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-mysql.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/drivers/adodb-pdo_mysql.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb-xmlschema.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/session/crypt.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/config/adodb/session/old/crypt.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/config/adodb/adodb-xmlschema03.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/datadict/datadict-firebird.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb-datadict.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/adodb/adodb.inc.php MATCHES REGEX: /system *\(/i
./ehcp/config/adodb/adodb.inc.php MATCHES REGEX: /`.+`/
./ehcp/config/dbutil.php MATCHES REGEX: /passthru *\(/i
./ehcp/webmail2/program/include/rcube_ldap.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_vcard.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcmail.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_imap.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/rcube_template.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/webmail/contrib/decrypt_headers.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/src/options_highlight.php MATCHES REGEX: /c99/i
./ehcp/webmail/themes/classic_blue.php MATCHES REGEX: /c99/i
./ehcp/webmail/themes/simple_green2.php MATCHES REGEX: /c99/i
./ehcp/webmail/functions/strings.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/mime.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/auth.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail/functions/imap_general.php MATCHES REGEX: /`.+`/
./ehcp/webmail/plugins/fortune/fortune_functions.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/classapp.php MATCHES REGEX: /passthru *\(/i
./ehcp/classapp.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/classapp.php MATCHES REGEX: /system *\(/i
./ehcp/classapp.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/languages/tc.inc.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/modules/jupload/jupload.inc.php MATCHES REGEX: /base64_decode *\(/i
./ehcp/net2ftp/includes/filesystem.inc.php MATCHES REGEX: /passthru *\(/i
./ehcp/net2ftp/includes/pclzip.lib.php MATCHES REGEX: /system *\(/i
./ehcp/net2ftp/includes/authorizations.inc.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php MATCHES REGEX: /shell_exec *\(/i
./ehcp/net2ftp/plugins/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/geshi/geshi/apache.php contains RewriteRule - check it manually for malicious redirects.
./ehcp/net2ftp/plugins/geshi/geshi/apache.php contains AddHandler - make sure it does not make ordinary files like images executable.
./ehcp/net2ftp/plugins/geshi/geshi/vbnet.php contains AddHandler - make sure it does not make ordinary files like images executable.
./shell.php MATCHES REGEX: /edoced_46esab/i
./shell.php MATCHES REGEX: /system *\(/i
./shell.php MATCHES REGEX: /`.+`/
./shell.php MATCHES REGEX: /hacked by /i
./shell.php MATCHES REGEX: /web[\s-]*shell/i
./shell.php MATCHES REGEX: /c99/i
./shell.php MATCHES REGEX: /r57/i
./shell.php MATCHES REGEX: /gooqle/i
./shell.php MATCHES REGEX: /_analist/i
./shell.php MATCHES REGEX: /anaiytics/i
./shell.php contains RewriteRule - check it manually for malicious redirects.
./shell.php contains AddHandler - make sure it does not make ordinary files like images executable.
./ehcp/net2ftp/modules/help/03-administrator.html MATCHES REGEX: /`.+`/
./ehcp/webmail2/program/lib/imap.inc MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/include/main.inc MATCHES REGEX: /base64_decode *\(/i
./ehcp/webmail2/program/js/jquery-1.3.min.js MATCHES REGEX: /`.+`/
./ehcp/webmail2/program/js/tiny_mce/tiny_mce_src.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/tiny_mce.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/themes/advanced/js/color_picker.js MATCHES REGEX: /c99/i
./ehcp/webmail2/program/js/tiny_mce/utils/validate.js MATCHES REGEX: /`.+`/
./ehcp/net2ftp/plugins/fckeditor/fckconfig.js MATCHES REGEX: /c99/i
./ehcp/net2ftp/plugins/tinymce/tiny_mce_src.j