On Fri, Apr 18, 2008 at 2:59 PM, Jim Lucas <[EMAIL PROTECTED]> wrote:
>  in the example code above that is injected into the top of the php scripts,
> the eval is evaluating the code that is read from the temp file, the temp
> file is never moved or renamed.  There for it will be removed when the
> script is done.


Looking at the first post:

On Wed, Apr 16, 2008 at 12:13 PM, Al <[EMAIL PROTECTED]> wrote:
> The hack places this file in
> numerous dirs on the site, I assume using a php script because the owner is
> "nobody".

>From my understanding this means a stand-alone file is written out by
a compromised means.  If something else has been said I missed it
along the way! :)

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to