!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/webalizer/   drwxr-xr-x
Free 49.58 GB of 127.8 GB (38.8%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     view_log.cgi (1.58 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/usr/bin/perl
# view_log.cgi
# Display the report for some log file

require './webalizer-lib.pl';
&ReadParse();

if ($ENV{'PATH_INFO'} =~ /^\/([^\/]+)(\/[^\/]*)$/) {
    # Proper path escaping
    $escaped = $1;
    $file = $2;
    $log = &un_urlize($escaped);
    }
elsif ($ENV{'PATH_INFO'} =~ /^(\/.*)(\/[^\/]*)$/) {
    # Path has been decode somehow, perhaps by proxy.. deal
    $log = $1;
    $file = $2;
    }
else {
    &error($text{'view_epath'});
    }
$file =~ /\.\./ || $file =~ /\<|\>|\||\0/ && &error($text{'view_efile'});
&can_edit_log($log) || &error($text{'view_ecannot'});

$lconf = &get_log_config($log) || &error($text{'view_elog'}." : $log");
$full = "$lconf->{'dir'}$file";
open(FILE, $full) || &error($text{'view_eopen'}." : $full");

# Display file contents
if ($full =~ /\.(html|htm)$/i && !$config{'naked'}) {
    while(read(FILE, $buf, 1024)) {
        $data .= $buf;
        }
    close(FILE);
    $data =~ /<TITLE>(.*)<\/TITLE>/i;
    $title = $1;
    $data =~ s/^[\000-\377]*<BODY.*>//i;
    $data =~ s/<\/BODY>[\000-\377]*$//i;

    &ui_print_header(undef, $title || $text{'view_title'}, "");
    print $data;
    if ($access{'view'}) {
        &ui_print_footer("", $text{'index_return'});
        }
    else {
        &ui_print_footer(
             "/$module_name/edit_log.cgi?file=$escaped",
            $text{'edit_return'},
            "", $text{'index_return'});
        }
    }
else {
    print "Content-type: ",$full =~ /\.png$/i ? "image/png" :
                   $full =~ /\.gif$/i ? "image/gif" :
                   $full =~ /\.(jpg|jpeg)$/i ? "image/jpeg" :
                   $full =~ /\.(html|htm)$/i ? "text/html" :
                               "text/plain","\n";
    print "\n";
    while(read(FILE, $buf, 1024)) {
        print $buf;
        }
    close(FILE);
    }


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0123 ]--