403Webshell
Server IP : 123.56.80.60  /  Your IP : 216.73.216.78
Web Server : Apache/2.4.54 (Win32) OpenSSL/1.1.1s PHP/7.4.33 mod_fcgid/2.3.10-dev
System : Windows NT iZhx3sob14hnz7Z 10.0 build 14393 (Windows Server 2016) i586
User : SYSTEM ( 0)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  C:/Program Files/python/Lib/site-packages/win32comext/axscript/client/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : C:/Program Files/python/Lib/site-packages/win32comext/axscript/client/pyscript_rexec.py
# A version of the ActiveScripting engine that enables rexec support
# This version supports hosting by IE - however, due to Python's
# rexec module being neither completely trusted nor private, it is
# *not* enabled by default.
# As of Python 2.2, rexec is simply not available - thus, if you use this,
# a HTML page can do almost *anything* at all on your machine.

# You almost certainly do NOT want to use thus!

import pythoncom
from win32com.axscript import axscript
import winerror
from . import pyscript

INTERFACE_USES_DISPEX = 0x00000004	# Object knows to use IDispatchEx
INTERFACE_USES_SECURITY_MANAGER = 0x00000008 # Object knows to use IInternetHostSecurityManager

class PyScriptRExec(pyscript.PyScript):
	# Setup the auto-registration stuff...
	_reg_verprogid_ = "Python.AXScript-rexec.2"
	_reg_progid_ = "Python" # Same ProgID as the standard engine.
#	_reg_policy_spec_ = default
	_reg_catids_ = [axscript.CATID_ActiveScript,axscript.CATID_ActiveScriptParse]
	_reg_desc_ = "Python ActiveX Scripting Engine (with rexec support)"
	_reg_clsid_ = "{69c2454b-efa2-455b-988c-c3651c4a2f69}"
	_reg_class_spec_ = "win32com.axscript.client.pyscript_rexec.PyScriptRExec"
	_reg_remove_keys_ = [(".pys",), ("pysFile",)]
	_reg_threading_ = "Apartment"

	def _GetSupportedInterfaceSafetyOptions(self):
		# print "**** calling", pyscript.PyScript._GetSupportedInterfaceSafetyOptions, "**->", pyscript.PyScript._GetSupportedInterfaceSafetyOptions(self)
		return INTERFACE_USES_DISPEX | \
		       INTERFACE_USES_SECURITY_MANAGER | \
		       axscript.INTERFACESAFE_FOR_UNTRUSTED_DATA | \
		       axscript.INTERFACESAFE_FOR_UNTRUSTED_CALLER

if __name__=='__main__':
	print("WARNING: By registering this engine, you are giving remote HTML code")
	print("the ability to execute *any* code on your system.")
	print()
	print("You almost certainly do NOT want to do this.")
	print("You have been warned, and are doing this at your own (significant) risk")
	pyscript.Register(PyScriptRExec)

Youez - 2016 - github.com/yon3zu
LinuXploit