My site has been having problems of late - the site being down during evening/night hours where any php page does not load at all but regular html pages do. My host said there was another site having trouble that also uses pafiledb 3.1 and they are looking into it.
With the mention of pafiledb 3.1 I thought I would look through the pafiledb folders as well as run a virus scan on the back up of the site I downloaded. What I found were a number of unexpected files.
In the /pafiledb/images/screenshots folder I found a file called dc.pl that my virus scanner flagged as PERL_GENERIC.Z (inside it was all sorts of hacker text) and there were a number of other files that should not have been there:
back.php
codekform.php
continue.gif
EasywbLogo.gif
easyWeb2.js
easyweb_title.gif
edan.php
faq.php
GBKonlineupdate.html
go.php
go_global.gif
Gulf Bank Online update screen.mht
help.php
indentificationcontinue.html
identify.php
index.html
line_dot.gif
login-on-green.gif
LoginServlet.php
lol.php
mailer.php
main.htm
mfa_cancel_to_easyweb.gif
ns.css
PrimaryNav.gif
ProxyBannerHTML.js
pull.php
rox.php
save_settings.gif
S-C.php
SecondaryNav.gif
security_centre_header.gif
sniper.php
title_idplus.gif
ToolBxBullet3.gif
transp.gif
untitled.bmp
w.jpg
php and pl are set as forbidden file extensions in the download configuration page in the ACP but I don't know if that is just for the files or for the screenshots as well.
I've deleted all the extra files and am wondering what I can do to prevent this from happening in the future and if there is some place in the database I should check to see if something was tampered with?
Thanks!
Edit: and again all the support info I entered at the top did not show in the topic...using
Integramod 1.4.1, phpbb 2.0.23, php 5.1.4
URL: http://kohan.strategyplanet.gamespy.com/