shell bypass 403
UnknownSec Shell
:
/
opt
/
cloudlinux
/
venv
/
lib64
/
python3.11
/
site-packages
/
ssa
/
internal
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
constants.py
from . import staging agent_log = '/var/log/clos_ssa/agent.log' agent_sock = '/opt/alt/clos_ssa/run/ssa.sock' agent_file = '/usr/share/clos_ssa/agent.file' config_file = '/usr/share/clos_ssa/ssa.conf' storage_file = '/usr/share/clos_ssa/storage' flag_file = '/usr/share/clos_ssa/ssa_enabled' autotracing_stats_file = '/usr/share/clos_ssa/autotracer_stats.latest' manager_log = '/var/log/clos_ssa/manager.log' autotracing_log = '/var/log/clos_ssa/autotracing.log' report_path = '/usr/share/clos_ssa/reports' mail_template_location = '/usr/share/clos_ssa/mail_templates' if staging(): stat_server = '' # mute sending to ClickHouse by default for staging s_key = 'a28704900cb548d29004fca032417efe' s_postfix = '10' else: stat_server = 'stat-api.cloudlinux.com' s_key = 'f24458e2b44b4b6f88e08e9debeff6b2' s_postfix = '6' sentry_dsn = f'https://{s_key}@cl.sentry.cloudlinux.com/{s_postfix}'
© 2024 UnknownSec