Submit
Path:
~
/
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
thread-self
/
root
/
usr
/
lib
/
.build-id
/
6f
/
File Content:
3f1c82b95f9744a00f89306797e6811823ffbf
#!/bin/bash ##CageFS proxyexec wrapper - ver 17 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` USER_TOKEN_PATH="/var/.cagefs/.cagefs.token" WEBSITE_ISOLATION_FLAG="/opt/cloudlinux/flags/enabled-flags.d/website-isolation.flag" if [[ -f "$WEBSITE_ISOLATION_FLAG" && -n "$WEBSITE_TOKEN_PATH" ]]; then USER_TOKEN_PATH="$WEBSITE_TOKEN_PATH" fi TOKEN=`/bin/cat ${USER_TOKEN_PATH}` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CAGEFS_ENTER $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CAGEFS_ENTER $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL
Edit
Rename
Chmod
Delete
FILE
FOLDER
Name
Size
Permission
Action
44dd0f7e10bc4efc2c267e365644ce13b482a5
---
0
463149afd29d948da6d0b420428ab55b8811d6
---
0
9c4fdfc45b5e8e4fb9c3997cf519f722d842e3
---
0
cb7c056d333116ab69654696f22e0f06982634
---
0
ffcbffed0fcb220eecae2d7a6715303efb6adc
---
0
06574cff5d91eae05cd660d7e776f8d16503f7
13408 bytes
0755
257c9f4b3be6617e84958e615a2a9754e44d1d
11968 bytes
0755
3e422d3c43630b9b88c11c052744f5d349774a
29008 bytes
0755
3f1c82b95f9744a00f89306797e6811823ffbf
1296 bytes
0755
44dd0f7e10bc4efc2c267e365644ce13b482a5
bytes
0
463149afd29d948da6d0b420428ab55b8811d6
bytes
0
4ef276bc9c82bdf8e87f31d63f9d498bfae815
28456 bytes
0755
56bbd35085a6febe1b0d9f6acd1698eb7acec3
8701496 bytes
0755
6c3a9dc65a0c75b4e76661bd33ab5f2deb3858
11816 bytes
0755
8c62ad05137ceccaf7e13dc6e9c0a29be00339
16856 bytes
0755
8d8435c4e1e77b291069eda571a532028cccb5
1531272 bytes
0755
9c4fdfc45b5e8e4fb9c3997cf519f722d842e3
bytes
0
a608fcd63a8b804c96f79c4742356bdc040453
11696 bytes
0755
aa3b82f8c1a1db775e989682dfb3812f3a412e
17112 bytes
0755
c40dfaf60c5763627034555d9933330fd052bc
20360 bytes
0755
c6f6d3ba228b034a65556c235f916c43126850
37888 bytes
0755
cb7c056d333116ab69654696f22e0f06982634
bytes
0
fbff379ab39846cb30cc15bbdab2e6c52839ee
96944 bytes
0755
fe7151e9406e46b320c9e7615a34c481db1b84
48920 bytes
0755
ffcbffed0fcb220eecae2d7a6715303efb6adc
bytes
0
N4ST4R_ID | Naxtarrr