HEX
Server: LiteSpeed
System: Linux atali.colombiahosting.com.co 5.14.0-570.12.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Tue May 13 06:11:55 EDT 2025 x86_64
User: coopserp (1713)
PHP: 8.2.29
Disabled: dl,exec,passthru,proc_open,proc_close,shell_exec,memory_limit,system,popen,curl_multi_exec,show_source,symlink,link,leak,listen,diskfreespace,tmpfile,ignore_user_abord,highlight_file,source,show_source,fpaththru,virtual,posix_ctermid,posix_getcwd,posix_getegid,posix_geteuid,posix_getgid,posix_getgrgid,posix_getgrnam,posix_getgroups,posix_getlogin,posix_getpgid,posix_getpgrp,posix_getpid,posix,posix_getppid,posix_getpwnam,posix_getpwuid,posix_getrlimit,posix_getsid,posix_getuid,posix_isatty,posix_kill,posix_mkfifo,posix_setegid,posix_seteuid,posix_setgid,posix_setpgid,posix_setsid,posix_setid,posix_times,posix_ttyname,posix_uname,proc_get_status,proc_nice,proc_terminate
Upload Files
File: //proc/self/root/proc/self/root/proc/thread-self/root/var/softaculous/procwire/update_pass.php
<?php

$salt_config = md5(mt_rand() . microtime(true));
echo $salt_db = '$2y$11$'.__randomBase64String(22);
echo '<SOFTACULOUS>';
echo $pass = substr(crypt('[[admin_pass]]' . '[[salt_config]]', $salt_db), 29);
		
function __randomBase64String($requiredLength = 22) {

	$buffer = '';
	$rawLength = (int) ($requiredLength * 3 / 4 + 1);
	$valid = false;

	if(function_exists('mcrypt_create_iv')) {
		$buffer = mcrypt_create_iv($rawLength, MCRYPT_DEV_URANDOM);
		if($buffer) $valid = true;
	}

	if(!$valid && function_exists('openssl_random_pseudo_bytes')) {
		$buffer = openssl_random_pseudo_bytes($rawLength);
		if($buffer) $valid = true;
	}

	if(!$valid || strlen($buffer) < $rawLength) {
		$bl = strlen($buffer);
		for($i = 0; $i < $rawLength; $i++) {
			if($i < $bl) {
				$buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255));
			} else {
				$buffer .= chr(mt_rand(0, 255));
			}
		}
	}

	$salt = str_replace('+', '.', base64_encode($buffer));
	$salt = substr($salt, 0, $requiredLength);

	$salt .= $valid; 

	return $salt;
}

@unlink('update_pass.php');

?>