!C99Shell v. 2.0 [PHP 7 Update] [25.02.2019]!

Software: Apache/2.2.16 (Debian). PHP/5.3.3-7+squeeze19 

uname -a: Linux mail.tri-specialutilitydistrict.com 2.6.32-5-amd64 #1 SMP Tue May 13 16:34:35 UTC
2014 x86_64
 

uid=33(www-data) gid=33(www-data) groups=33(www-data) 

Safe-mode: OFF (not secure)

/usr/share/vexim/   drwxr-xr-x
Free 130.06 GB of 142.11 GB (91.52%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     userchangesubmit.php (2.92 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
  
include_once dirname(__FILE__) . "/config/variables.php";
  include_once 
dirname(__FILE__) . "/config/authuser.php";
  include_once 
dirname(__FILE__) . "/config/functions.php";
  include_once 
dirname(__FILE__) . "/config/httpheaders.php";
  if (isset(
$_POST['on_vacation'])) {$_POST['on_vacation'] = 1;} else {$_POST['on_vacation'] = 0;}
  if (isset(
$_POST['on_forward'])) {$_POST['on_forward'] = 1;} else {$_POST['on_forward'] = 0;}
  if (isset(
$_POST['unseen'])) {$_POST['unseen'] = 1;} else {$_POST['unseen'] = 0;}
  
# Do some checking, to make sure the user is ALLOWED to make these changes
  
$query "SELECT avscan,spamassassin,maxmsgsize from domains WHERE domain_id = {$_SESSION['domain_id']}";
  
$result $db->query($query);
  
$row $result->fetchRow();
  if ((isset(
$_POST['on_avscan'])) && ($row['avscan'] = 1)) {$_POST['on_avscan'] = 1;} else {$_POST['on_avscan'] = 0;}
  if ((isset(
$_POST['on_spamassassin'])) && ($row['spamassassin'] = 1)) {$_POST['on_spamassassin'] = 1;} else {$_POST['on_spamassassin'] = 0;}
  if ((isset(
$_POST['maxmsgsize'])) && ($_POST['maxmsgsize'] > $row['maxmsgsize'])) {$_POST['maxmsgsize'] = $row['maxmsgsize'];}

  if (
$_POST['realname'] != "") {
    
$query "UPDATE users SET realname='{$_POST['realname']}'
        WHERE user_id=
{$_SESSION['user_id']}";
    
$result $db->query($query);
  }

# Update the password, if the password was given
  
if (validate_password($_POST['clear'], $_POST['vclear'])) {
    
$cryptedpassword crypt_password($_POST['clear']);
    
$query "UPDATE users SET crypt='$cryptedpassword'
        WHERE user_id=
{$_SESSION['user_id']}";
    
$result $db->query($query);
    if (!
DB::isError($result)) {
      
$_SESSION['crypt'] = $cryptedpassword;
      
header ("Location: userchange.php?userupdated");
      die;
    } else {
      
header ("Location: userchange.php?badpass");
      die;
    }
    
header ("Location: userchange.php?badpass");
    die;
  }


    
# Finally 'the rest' which is handled by the profile form
    
$query "UPDATE users SET on_avscan='{$_POST['on_avscan']}',
        on_spamassassin=
{$_POST['on_spamassassin']},
        sa_tag='
{$_POST['sa_tag']}',
        sa_refuse='
{$_POST['sa_refuse']}',
        on_vacation='
{$_POST['on_vacation']}',
        vacation='
{$_POST['vacation']}',
        on_forward='
{$_POST['on_forward']}',
        forward='
{$_POST['forward']}',
        maxmsgsize='
{$_POST['maxmsgsize']}',
        unseen='
{$_POST['unseen']}'
        WHERE user_id=
{$_SESSION['user_id']}";
    
$result $db->query($query);
    if (!
DB::isError($result)) {
      if (
strlen($_POST['vacation']) > $max_vacation_length)
      {
        
header ("Location: userchange.php?uservacationtolong=" strlen($_POST['vacation']));
      }
      else
      {
        
header ("Location: userchange.php?userupdated");
      }
      die;
    } else {
      
header ("Location: userchange.php?userfailed");
      die;
    }

  
header ("Location: userchange.php?userupdated");
?>
<!-- Layout and CSS tricks obtained from http://www.bluerobot.com/web/layouts/ -->

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by KaizenLouie | C99Shell Github | Generation time: 0.0086 ]--