!C99Shell v. 2.1 [PHP 8 Update] [02.02.2022]!

Software: Apache/2.4.53 (Unix) OpenSSL/1.1.1o PHP/7.4.29 mod_perl/2.0.12 Perl/v5.34.1. PHP/7.4.29 

uname -a: Linux vps-2738122-x 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64 

uid=1(daemon) gid=1(daemon) grupos=1(daemon) 

Safe-mode: OFF (not secure)

/opt/apex_led/php/3ros/simplesamlphp/modules/saml/www/sp/   drwxrwxr-x
Free 13.65 GB of 61.93 GB (22.03%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     saml1-acs.php (2.58 KB)      -rwxrwxr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

if (!array_key_exists('SAMLResponse'$_REQUEST) && !array_key_exists('SAMLart'$_REQUEST)) {
    throw new 
SimpleSAML_Error_BadRequest('Missing SAMLResponse or SAMLart parameter.');
}

if (!
array_key_exists('TARGET'$_REQUEST)) {
    throw new 
SimpleSAML_Error_BadRequest('Missing TARGET parameter.');
}

$sourceId $_SERVER['PATH_INFO'];
$end strpos($sourceId'/'1);
if (
$end === FALSE) {
    
$end strlen($sourceId);
}
$sourceId substr($sourceId1$end 1);

$source SimpleSAML_Auth_Source::getById($sourceId'sspmod_saml_Auth_Source_SP');

SimpleSAML_Logger::debug('Received SAML1 response');


$target = (string)$_REQUEST['TARGET'];
if (
preg_match('@^https?://@i'$target)) {
    
/* Unsolicited response. */
    
$state = array(
        
'saml:sp:isUnsolicited' => TRUE,
        
'saml:sp:AuthId' => $sourceId,
        
'saml:sp:RelayState' => $target,
    );
} else {
    
$state SimpleSAML_Auth_State::loadState($_REQUEST['TARGET'], 'saml:sp:sso');

    
/* Check that the authentication source is correct. */
    
assert('array_key_exists("saml:sp:AuthId", $state)');
    if (
$state['saml:sp:AuthId'] !== $sourceId) {
        throw new 
SimpleSAML_Error_Exception('The authentication source id in the URL does not match the authentication source which sent the request.');
    }

    
assert('isset($state["saml:idp"])');
}

$spMetadata $source->getMetadata();

if (
array_key_exists('SAMLart'$_REQUEST)) {
    if (!isset(
$state['saml:idp'])) {
        
/* Unsolicited response. */
        
throw new SimpleSAML_Error_Exception('IdP initiated authentication not supported with the SAML 1.1 SAMLart protocol.');
    }
    
$idpMetadata $source->getIdPMetadata($state['saml:idp']);

    
$responseXML SimpleSAML_Bindings_Shib13_Artifact::receive($spMetadata$idpMetadata);
    
$isValidated TRUE/* Artifact binding validated with ssl certificate. */
} elseif (array_key_exists('SAMLResponse'$_REQUEST)) {
    
$responseXML $_REQUEST['SAMLResponse'];
    
$responseXML base64_decode($responseXML);
    
$isValidated FALSE/* Must check signature on response. */
} else {
    
assert('FALSE');
}

$response = new SimpleSAML_XML_Shib13_AuthnResponse();
$response->setXML($responseXML);

$response->setMessageValidated($isValidated);
$response->validate();

$responseIssuer $response->getIssuer();
$attributes $response->getAttributes();

if (isset(
$state['saml:idp']) && $responseIssuer !== $state['saml:idp']) {
    throw new 
SimpleSAML_Error_Exception('The issuer of the response wasn\'t the destination of the request.');
}

$logoutState = array(
    
'saml:logout:Type' => 'saml1'
    
);
$state['LogoutState'] = $logoutState;

$source->handleResponse($state$responseIssuer$attributes);
assert('FALSE');

?>

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.1 [PHP 8 Update] [02.02.2022] maintained byC99Shell Github | Generation time: 0.4846 ]--