!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/sentry/   drwxr-xr-x
Free 50.93 GB of 127.8 GB (39.85%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     save_logcheck.cgi (2.42 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# save_logcheck.cgi
# Save logcheck.sh options

require './sentry-lib.pl';
&ReadParse();
&error_setup($text{'logcheck_err'});

# Get the current cron job
&foreign_require("cron", "cron-lib.pl");
@jobs = &cron::list_cron_jobs();
foreach $j (@jobs) {
    $job = $j if ($j->{'command'} =~ /$config{'logcheck'}/);
    }

# Validate and save inputs
$conf = &get_logcheck_config();
&lock_config_files($conf);
$in{'to'} =~ /^\S+$/ || &error($text{'logcheck_eto'});
if ($in{'runparts'}) {
    # Being run from a script that we cannot change
    }
elsif (!$in{'active'} && !$job) {
    # Cron job is not setup yet, and doesn't need to be .. do nothing
    }
else {
    # Create or update the cron job
    if (!$job) {
        $job = { 'command' => $config{'logcheck'},
             'user' => 'root' };
        $creating++;
        }
    $job->{'active'} = $in{'active'};
    &cron::parse_times_input($job, \%in);
    &lock_file(&cron::cron_file($job));
    if ($creating) {
        &cron::create_cron_job($job);
        }
    else {
        &cron::change_cron_job($job);
        }
    &unlock_file(&cron::cron_file($job));
    }
$to = &find_value("SYSADMIN", $conf);
if ($to =~ /^\$(\S+)$/) {
    &save_config($conf, $1, $in{'to'});
    }
else {
    &save_config($conf, "SYSADMIN", $in{'to'});
    }
&flush_file_lines();
&unlock_config_files($conf);

$hacking = &find_value("HACKING_FILE", $conf, 1);
$hacking = &find_value("CRACKING_FILE", $conf, 1) if (!$hacking);
&lock_file($hacking);
$in{'hacking'} =~ s/\r//g;
$in{'hacking'} =~ s/\n*$/\n/;
&open_tempfile(HACKING, ">$hacking");
&print_tempfile(HACKING, $in{'hacking'});
&close_tempfile(HACKING);
&unlock_file($hacking);

$violations = &find_value("VIOLATIONS_FILE", $conf, 1);
&lock_file($violations);
$in{'violations'} =~ s/\r//g;
$in{'violations'} =~ s/\n*$/\n/;
&open_tempfile(VIOLATIONS, ">$violations");
&print_tempfile(VIOLATIONS, $in{'violations'});
&close_tempfile(VIOLATIONS);
&unlock_file($violations);

$violations_ign = &find_value("VIOLATIONS_IGNORE_FILE", $conf, 1);
&lock_file($violations_ign);
$in{'violations_ign'} =~ s/\r//g;
$in{'violations_ign'} =~ s/\n*$/\n/;
&open_tempfile(IGNORE, ">$violations_ign");
&print_tempfile(IGNORE, $in{'violations_ign'});
&close_tempfile(IGNORE);
&unlock_file($violations_ign);

$ignore = &find_value("IGNORE_FILE", $conf, 1);
&lock_file($ignore);
$in{'ignore'} =~ s/\r//g;
$in{'ignore'} =~ s/\n*$/\n/;
&open_tempfile(IGNORE, ">$ignore");
&print_tempfile(IGNORE, $in{'ignore'});
&close_tempfile(IGNORE);
&unlock_file($ignore);

&webmin_log("logcheck");
&redirect("");


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0053 ]--