!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/postfix/   drwxr-xr-x
Free 49.58 GB of 127.8 GB (38.8%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     save_sasl.cgi (2.49 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# Save SMTP authentication options

require './postfix-lib.pl';

&ReadParse();

$access{'sasl'} || &error($text{'opts_ecannot'});

&error_setup($text{'sasl_err'});

# Validate SASL options
if ($in{'smtpd_tls_key_file_def'} eq "__USE_FREE_FIELD__") {
    -r $in{'smtpd_tls_key_file'} || &error($text{'sasl_ekey'});
    }
if ($in{'smtpd_tls_cert_file_def'} eq "__USE_FREE_FIELD__") {
    -r $in{'smtpd_tls_cert_file'} || &error($text{'sasl_ecert'});
    }
if ($in{'smtpd_tls_CAfile_def'} eq "__USE_FREE_FIELD__") {
    -r $in{'smtpd_tls_CAfile'} || &error($text{'sasl_eca'});
    }

# Validate remote mail server login
if (!$in{'login_none'}) {
    $in{'login_user'} =~ /^[^: ]+$/ || &error($text{'sasl_elogin'});
    $in{'login_pass'} =~ /^[^: ]*$/ || &error($text{'sasl_epass'});
    }

&lock_postfix_files();
&save_options(\%in);

# Save security options
@opts = split(/\0/, $in{'sasl_opts'});
&set_current_value("smtpd_sasl_security_options", join(" ", @opts));

# Save relay options that we care about
@recip = split(/[\s,]+/, &get_current_value("smtpd_recipient_restrictions"));
%newrecip = map { $_, 1 } split(/\0/, $in{'sasl_recip'});
foreach $o (&list_smtpd_restrictions()) {
    if ($newrecip{$o}) {
        push(@recip, $o) if (&indexof($o, @recip) < 0);
        }
    else {
        @recip = grep { $_ ne $o } @recip;
        }
    }
&set_current_value("smtpd_recipient_restrictions", join(" ", @recip));

# Save SSL options
if ($postfix_version >= 2.3) {
    &set_current_value("smtpd_tls_security_level",
               $in{'smtpd_tls_security_level'});
    }

# Save SMTP relay options
$rh = &get_current_value("relayhost");
$rh =~ s/^\[(.*)\]$/$1/g;
if ($rh) {
    if ($in{'login_none'} == 0 &&
        !&get_current_value("smtp_sasl_password_maps")) {
        # Setup initial map
        &set_current_value("smtp_sasl_password_maps",
                "hash:".&guess_config_dir()."/smtp_sasl_password_map");
        }
        $pmap = &get_maps("smtp_sasl_password_maps");
    foreach my $o (@$pmap) {
                if ($o->{'name'} eq $rh) {
            $old = $o;
            }
        }
    $newmap = { 'name' => $rh,
            'value' => $in{'login_user'}.":".$in{'login_pass'} };
    if ($old && $in{'login_def'}) {
        # Delete entry
        &delete_mapping("smtp_sasl_password_maps", $old);
        }
    elsif ($old && !$in{'login_def'}) {
        # Update entry
        &modify_mapping("smtp_sasl_password_maps", $old, $newmap);
        }
    elsif (!$old && !$in{'login_def'}) {
        # Add entry
        &create_mapping("smtp_sasl_password_maps", $newmap);
        }
    &regenerate_any_table("smtp_sasl_password_maps");
    }

&unlock_postfix_files();

&reload_postfix();

&webmin_log("sasl");
&redirect("");




:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0118 ]--