Submit
Path:
~
/
/
proc
/
self
/
root
/
usr
/
lib
/
.build-id
/
fe
/
File Content:
2f8563d3ec9b2c7d348e260c015eb237574379
#!/bin/bash ##CageFS proxyexec wrapper - ver 18 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` CWD=`pwd` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user LOCKFILE=/tmp/.crontab.lock # automatically obtain next available fd # previous strategy with `ulimit -n` failed # in environment where limit is very high (e.g. 1073741816) exec {FD}>$LOCKFILE if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" else REMOTE="" fi eval "( /usr/bin/flock -x -w 10 $FD || exit 1 echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_CHECK $$ ) $FD> $LOCKFILE" [ $? -ne 0 ] && exit 1 eval "( /usr/bin/flock -x -w 10 $FD || exit 1 $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_LIST $$ 2>/dev/null |cat > /var/spool/cron/$USR ) $FD> $LOCKFILE" /usr/bin/crontab.cagefs $@ eval "( /usr/bin/flock -x -w 10 $FD || exit 1 if [ -e /var/spool/cron/$USR ]; then cat /var/spool/cron/$USR | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null else echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null fi ) $FD>$LOCKFILE"
Edit
Rename
Chmod
Delete
FILE
FOLDER
Name
Size
Permission
Action
10b57cb42499f1472fd629e19a1311bdfdb89f
---
0
1b1e2a60229d57e952e6a7243ba581c26a8406
---
0
30f5e6a5607c33e570767c64c606fe063cb09e
---
0
93a289ddb32814099d9b6aec32dc566666bc8a
---
0
0b3d7dad9f0626549851c54b514cd845b6b1f4
118008 bytes
0755
0b8477af6553918722070ae3ed3c6064aa9a59
58240 bytes
0755
10b57cb42499f1472fd629e19a1311bdfdb89f
bytes
0
1b1e2a60229d57e952e6a7243ba581c26a8406
bytes
0
1bcaa1339d33cad50a70d2723c90a490ded035
187904 bytes
0755
2aba0aa06a41bba5f9c7a6e61c16b7789e80b3
2236528 bytes
0755
2d84b279df6d2ae4173d672e749b74d7436c06
136472 bytes
0755
2f8563d3ec9b2c7d348e260c015eb237574379
1524 bytes
0755
30f5e6a5607c33e570767c64c606fe063cb09e
bytes
0
35b3391c6826104262fa824338803292cda645
84904 bytes
0755
421e2f7579952493ef111ead4f8df43fad87db
336784 bytes
0755
4e5e5bdb07fc2331f89b9e2870b8b5dda7b25b
47056 bytes
0755
7967e886a8edc6c7e15421a8e3564ca98d2ab1
11736 bytes
0755
7c83deb7cf938f7807ee7acf0e2faaa64d679c
15968 bytes
0755
8a15a1671f8bce237b3a467000d662af550b89
196088 bytes
0755
8abcd9b89dbf258179373bfffa24bc45186e26
294480 bytes
0755
90daa0dab8e10675c9e075ffd473ecbccb7e4f
11768 bytes
0755
9236b1eb5f021123500aa5249b1bc57d0a986b
11960 bytes
0755
93807e310e65e827f184ab52b32a236c4c9883
7088312 bytes
0755
93a289ddb32814099d9b6aec32dc566666bc8a
bytes
0
9ec9a9b47f9250794c75e06245707907fd5c82
42520 bytes
0755
a418fa6c2cd28e433fe61e9b8ee56e6ab6d85e
131152 bytes
0755
ada27cd73dea44d79bbd45157e1091a70795b7
12232 bytes
0755
b3356342088c5b7dda898af387e3edce781950
46640 bytes
0755
c57bd1a7f75c5f3cb075ec6a7b54b833320f54
130840 bytes
0755
ca3feabdde35e5dda4c636d1d96e3748d10189
12280 bytes
0755
e3ca16c965cb8df22f7799350e57de018cd5e4
11880 bytes
0755
fda1efd798197aec8c0cb06242b10f73910a3a
41464 bytes
0755
N4ST4R_ID | Naxtarrr