!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/spam/   drwxr-xr-x
Free 53.79 GB of 127.8 GB (42.09%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     save_report.cgi (1.95 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# save_report.cgi
# Save report generation options

require './spam-lib.pl';
&error_setup($text{'report_err'});
&ReadParse();
&set_config_file_in(\%in);
&can_use_check("report");
&execute_before("report");
&lock_spam_files();
$conf = &get_config();

&save_directives($conf, 'clear_report_template',
        $in{'clear_report'} ? [ "" ] : [ ], 1);
$in{'report'} =~ s/\r//g;
@report = split(/\n/, $in{'report'});
&save_directives($conf, 'report', \@report, 1);

&save_directives($conf, 'clear_terse_report_template',
        $in{'clear_terse'} ? [ "" ] : [ ], 1);
$in{'terse'} =~ s/\r//g;
@terse = split(/\n/, $in{'terse'});
&save_directives($conf, 'terse_report', \@terse, 1);

if (&version_atleast(3.0)) {
    foreach $h ("subject", "from", "to") {
        if (!$in{"rewrite_header_${h}_def"}) {
            push(@rheader, { 'name' => 'rewrite_header',
                'value' => $h." ".$in{"rewrite_header_${h}"} });
            }
        }
    &save_directives($conf, "rewrite_header", \@rheader);
    }
else {
    &parse_yes_no($conf, "rewrite_subject");
    &parse_opt($conf, "subject_tag", undef);
    }
&parse_yes_no($conf, "report_header");
&parse_yes_no($conf, "use_terse_report");
&parse_yes_no($conf, "fold_headers");
&parse_yes_no($conf, "detailed_phrase_score");
if (!&version_atleast(3.0)) {
    &parse_yes_no($conf, "spam_level_stars");
    }
&parse_opt($conf, "spam_level_char", \&char_check);
&parse_yes_no($conf, "defang_mime");
&parse_option($conf, "report_safe") if (defined($in{'report_safe'}));

if (&version_atleast(3)) {
    for($i=0; defined($addfor = $in{"addfor_$i"}); $i++) {
        next if (!$addfor);
        $addheader = $in{"addheader_$i"};
        $addtext = $in{"addtext_$i"};
        $addheader =~ /^\S+$/ ||
            &error(&text('report_eaddheader', $i+1));
        push(@adds, "$addfor $addheader $addtext");
        }
    &save_directives($conf, "add_header", \@adds, 1);
    }

&flush_file_lines();
&unlock_spam_files();
&webmin_log("report");
&execute_after("report");
&redirect($redirect_url);

sub char_check
{
$_[0] =~ /^\S$/ || &error($text{'report_echar'});
}


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0123 ]--