!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/man/   drwxr-xr-x
Free 53.79 GB of 127.8 GB (42.09%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     view_doc.cgi (1.88 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# view_doc.cgi
# View some package doc file

require './man-lib.pl';
&ReadParse();

$in{'file'} = &simplify_path($in{'file'});
$in{'file'} !~ /[\\\&\;\`\'\"\|\*\?\~\<\>\^\(\)\[\]\{\}\$\n\r]/ ||
    &error($text{'doc_epath'});
foreach $d (split(/\s+/, $config{'doc_dir'})) {
    $ok++ if (&is_under_directory($d, $in{'file'}));
    }
$ok++ if ($config{'custom_dir'} &&
      &is_under_directory($config{'custom_dir'}, $in{'file'}));
$ok || &error($text{'doc_epath'});
if (!-r $in{'file'}) {
    if (-r "$in{'file'}.gz") {
        $in{'file'} = "$in{'file'}.gz";
        }
    else {
        &error($text{'doc_epath'});
        }
    }

# Just output if this is an image
$mt = &guess_mime_type($in{'file'});
if ($mt =~ /^image\//) {
    print "Content-type: $mt\r\n\r\n";
    print &read_file_contents($in{'file'});
    exit;
    }

&ui_print_header(undef, $text{'doc_title'}, "");

# Work out compression format
open(FILE, $in{'file'});
read(FILE, $two, 2);
$qm = quotemeta($in{'file'});
if ($two eq "\037\213") {
    close(FILE);
    &open_execute_command(FILE, "gunzip -c $qm", 1, 1);
    }
elsif ($two eq "BZ") {
    close(FILE);
    &open_execute_command(FILE, "bunzip2 -c $qm", 1, 1);
    }
seek(FILE, 0, 0);

$out = "";
if ($in{'file'} =~ /\.htm/i) {
    # Display HTML documentation
    ($dir = $in{'file'}) =~ s/\/[^\/]+$//;
    while($line = <FILE>) {
        $line =~ s/(href|src)="([^"#][^"]*)"/$1="view_doc.cgi?file=$dir\/$2"/ig;
        $line =~ s/(href|src)='([^'#][^']*)'/$1='view_doc.cgi?file=$dir\/$2'/ig;
        $line =~ s/(href|src)=([^'"\s#][^'"\s>]*)/$1='view_doc.cgi?file=$dir\/$2'/ig;
        $out .= $line;
        }
    }
else {
    # Display text file
    $out .= "<pre>";
    @for = split(/\s+/, $in{'for'});
    while($line = <FILE>) {
        $line =~ s/.\010//g;
        $line = &html_escape($line);
        foreach $f (@for) {
            $line =~ s/($f)/<b>$1<\/b>/ig;
            }
        $out .= $line;
        }
    $out .= "</pre>";
    }
close(FILE);
&show_view_table(&text('doc_header', $in{'file'}), $out);

&ui_print_footer("", $text{'index_return'});


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0117 ]--