Submit
Path:
~
/
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
3406642
/
root
/
lib
/
.build-id
/
fe
/
File Content:
2f8563d3ec9b2c7d348e260c015eb237574379
#!/bin/bash ##CageFS proxyexec wrapper - ver 18 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` CWD=`pwd` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user LOCKFILE=/tmp/.crontab.lock # automatically obtain next available fd # previous strategy with `ulimit -n` failed # in environment where limit is very high (e.g. 1073741816) exec {FD}>$LOCKFILE if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" else REMOTE="" fi eval "( /usr/bin/flock -x -w 10 $FD || exit 1 echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_CHECK $$ ) $FD> $LOCKFILE" [ $? -ne 0 ] && exit 1 eval "( /usr/bin/flock -x -w 10 $FD || exit 1 $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_LIST $$ 2>/dev/null |cat > /var/spool/cron/$USR ) $FD> $LOCKFILE" /usr/bin/crontab.cagefs $@ eval "( /usr/bin/flock -x -w 10 $FD || exit 1 if [ -e /var/spool/cron/$USR ]; then cat /var/spool/cron/$USR | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null else echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null fi ) $FD>$LOCKFILE"
Edit
Rename
Chmod
Delete
FILE
FOLDER
Name
Size
Permission
Action
1b1e2a60229d57e952e6a7243ba581c26a8406
---
0
30f5e6a5607c33e570767c64c606fe063cb09e
---
0
93a289ddb32814099d9b6aec32dc566666bc8a
---
0
10642c57006f548a31996750b27d2d3cecff44
354200 bytes
0755
16f4af0cf41e838cc8a8866b9c2d7d70b9877a
20928 bytes
0755
1b1e2a60229d57e952e6a7243ba581c26a8406
bytes
0
2aba0aa06a41bba5f9c7a6e61c16b7789e80b3
2236528 bytes
0755
2d84b279df6d2ae4173d672e749b74d7436c06
136472 bytes
0755
2f8563d3ec9b2c7d348e260c015eb237574379
1524 bytes
0755
30f5e6a5607c33e570767c64c606fe063cb09e
bytes
0
35b3391c6826104262fa824338803292cda645
84904 bytes
0755
73635d293f26492ebbf5b4b65092f276aa3203
12024 bytes
0755
7967e886a8edc6c7e15421a8e3564ca98d2ab1
11736 bytes
0755
9236b1eb5f021123500aa5249b1bc57d0a986b
11960 bytes
0755
93a289ddb32814099d9b6aec32dc566666bc8a
bytes
0
9ec9a9b47f9250794c75e06245707907fd5c82
42520 bytes
0755
a99e91abceb79fba9b6495ba275880a17d87b1
46672 bytes
0755
b3356342088c5b7dda898af387e3edce781950
46640 bytes
0755
ca3feabdde35e5dda4c636d1d96e3748d10189
12280 bytes
0755
e3ca16c965cb8df22f7799350e57de018cd5e4
11880 bytes
0755
ecb559508a2ef8c9d9825d0a51cf42129d69f3
1165080 bytes
0755
N4ST4R_ID | Naxtarrr