Linux moon.hostseba.com 4.18.0-553.51.1.lve.el8.x86_64 #1 SMP Tue May 6 15:14:12 UTC 2025 x86_64
LiteSpeed
Server IP : 103.174.152.68 & Your IP : 216.73.216.150
Domains :
Cant Read [ /etc/named.conf ]
User : julaysp1
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
opt /
alt /
ruby18 /
share /
ri /
1.8 /
system /
FileUtils /
Delete
Unzip
Name
Size
Permission
Date
Action
DryRun
[ DIR ]
drwxr-xr-x
2023-11-25 20:34
Entry_
[ DIR ]
drwxr-xr-x
2023-11-25 20:34
NoWrite
[ DIR ]
drwxr-xr-x
2023-11-25 20:34
StreamUtils_
[ DIR ]
drwxr-xr-x
2023-11-25 20:34
Verbose
[ DIR ]
drwxr-xr-x
2023-11-25 20:34
cd-i.yaml
640
B
-rw-r--r--
2023-07-26 13:47
cdesc-FileUtils.yaml
6.06
KB
-rw-r--r--
2023-07-26 13:47
chdir-i.yaml
236
B
-rw-r--r--
2023-07-26 13:47
chmod-i.yaml
598
B
-rw-r--r--
2023-07-26 13:47
chmod_R-i.yaml
504
B
-rw-r--r--
2023-07-26 13:47
chown-i.yaml
756
B
-rw-r--r--
2023-07-26 13:47
chown_R-i.yaml
765
B
-rw-r--r--
2023-07-26 13:47
cmp-i.yaml
229
B
-rw-r--r--
2023-07-26 13:47
collect_method-c.yaml
458
B
-rw-r--r--
2023-07-26 13:47
commands-c.yaml
421
B
-rw-r--r--
2023-07-26 13:47
compare_file-i.yaml
553
B
-rw-r--r--
2023-07-26 13:47
compare_stream-i.yaml
307
B
-rw-r--r--
2023-07-26 13:47
copy-i.yaml
240
B
-rw-r--r--
2023-07-26 13:47
copy_entry-i.yaml
1.04
KB
-rw-r--r--
2023-07-26 13:47
copy_file-i.yaml
373
B
-rw-r--r--
2023-07-26 13:47
copy_stream-i.yaml
356
B
-rw-r--r--
2023-07-26 13:47
cp-i.yaml
884
B
-rw-r--r--
2023-07-26 13:47
cp_r-i.yaml
1.29
KB
-rw-r--r--
2023-07-26 13:47
fu_have_symlink%3f-i.yaml
188
B
-rw-r--r--
2023-07-26 13:47
fu_world_writable%3f-i.yaml
195
B
-rw-r--r--
2023-07-26 13:47
getwd-i.yaml
220
B
-rw-r--r--
2023-07-26 13:47
have_option%3f-c.yaml
506
B
-rw-r--r--
2023-07-26 13:47
identical%3f-i.yaml
243
B
-rw-r--r--
2023-07-26 13:47
install-i.yaml
747
B
-rw-r--r--
2023-07-26 13:47
link-i.yaml
240
B
-rw-r--r--
2023-07-26 13:47
ln-i.yaml
1.23
KB
-rw-r--r--
2023-07-26 13:47
ln_s-i.yaml
1.32
KB
-rw-r--r--
2023-07-26 13:47
ln_sf-i.yaml
364
B
-rw-r--r--
2023-07-26 13:47
makedirs-i.yaml
248
B
-rw-r--r--
2023-07-26 13:47
mkdir-i.yaml
539
B
-rw-r--r--
2023-07-26 13:47
mkdir_p-i.yaml
836
B
-rw-r--r--
2023-07-26 13:47
mkpath-i.yaml
244
B
-rw-r--r--
2023-07-26 13:47
move-i.yaml
240
B
-rw-r--r--
2023-07-26 13:47
mv-i.yaml
787
B
-rw-r--r--
2023-07-26 13:47
options-c.yaml
414
B
-rw-r--r--
2023-07-26 13:47
options_of-c.yaml
415
B
-rw-r--r--
2023-07-26 13:47
pwd-i.yaml
337
B
-rw-r--r--
2023-07-26 13:47
remove-i.yaml
239
B
-rw-r--r--
2023-07-26 13:47
remove_dir-i.yaml
356
B
-rw-r--r--
2023-07-26 13:47
remove_entry-i.yaml
482
B
-rw-r--r--
2023-07-26 13:47
remove_entry_secure-i.yaml
1.88
KB
-rw-r--r--
2023-07-26 13:47
remove_file-i.yaml
325
B
-rw-r--r--
2023-07-26 13:47
rm-i.yaml
659
B
-rw-r--r--
2023-07-26 13:47
rm_f-i.yaml
414
B
-rw-r--r--
2023-07-26 13:47
rm_r-i.yaml
1.18
KB
-rw-r--r--
2023-07-26 13:47
rm_rf-i.yaml
546
B
-rw-r--r--
2023-07-26 13:47
rmdir-i.yaml
557
B
-rw-r--r--
2023-07-26 13:47
rmtree-i.yaml
242
B
-rw-r--r--
2023-07-26 13:47
safe_unlink-i.yaml
251
B
-rw-r--r--
2023-07-26 13:47
symlink-i.yaml
248
B
-rw-r--r--
2023-07-26 13:47
touch-i.yaml
531
B
-rw-r--r--
2023-07-26 13:47
uptodate%3f-i.yaml
538
B
-rw-r--r--
2023-07-26 13:47
Save
Rename
--- !ruby/object:RI::MethodDescription aliases: [] block_params: comment: - !ruby/struct:SM::Flow::P body: "This method removes a file system entry <tt>path</tt>. <tt>path</tt> shall be a regular file, a directory, or something. If <tt>path</tt> is a directory, remove it recursively. This method is required to avoid TOCTTOU (time-of-check-to-time-of-use) local security vulnerability of #rm_r. #rm_r causes security hole when:" - !ruby/struct:SM::Flow::VERB body: " * Parent directory is world writable (including /tmp).\n * Removing directory tree includes world writable directory.\n * The system has symbolic link.\n" - !ruby/struct:SM::Flow::P body: To avoid this security hole, this method applies special preprocess. If <tt>path</tt> is a directory, this method chown(2) and chmod(2) all removing directories. This requires the current process is the owner of the removing whole directory tree, or is the super user (root). - !ruby/struct:SM::Flow::P body: "WARNING: You must ensure that <b>ALL</b> parent directories cannot be moved by other untrusted users. For example, parent directories should not be owned by untrusted users, and should not be world writable except when the sticky bit set." - !ruby/struct:SM::Flow::P body: "WARNING: Only the owner of the removing directory tree, or Unix super user (root) should invoke this method. Otherwise this method does not work." - !ruby/struct:SM::Flow::P body: "For details of this security vulnerability, see Perl's case:" - !ruby/struct:SM::Flow::VERB body: " http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448\n http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452\n" - !ruby/struct:SM::Flow::P body: For fileutils.rb, this vulnerability is reported in [ruby-dev:26100]. full_name: FileUtils#remove_entry_secure is_singleton: false name: remove_entry_secure params: (path, force = false) visibility: public