!C99Shell v. 2.5 [PHP 8 Update] [24.05.2025]!

Software: Apache/2.4.41 (Ubuntu). PHP/8.0.30 

uname -a: Linux apirnd 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64 

uid=33(www-data) gid=33(www-data) groups=33(www-data) 

Safe-mode: OFF (not secure)

/uploads/script/vendor/enlightn/enlightn/src/Analyzers/Security/   drwxr-xr-x
Free 13.12 GB of 57.97 GB (22.63%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Self remove    Logout    


Viewing file:     VulnerableDependencyAnalyzer.php (2.61 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

namespace Enlightn\Enlightn\Analyzers\Security;

use 
Enlightn\Enlightn\Composer;
use 
Enlightn\SecurityChecker\AdvisoryAnalyzer;
use 
Enlightn\SecurityChecker\AdvisoryFetcher;
use 
Enlightn\SecurityChecker\AdvisoryParser;
use 
Enlightn\SecurityChecker\Composer as SecurityCheckerComposer;
use 
Throwable;

class 
VulnerableDependencyAnalyzer extends SecurityAnalyzer
{
    
/**
     * The title describing the analyzer.
     *
     * @var string|null
     */
    
public $title 'Your application does not rely on backend dependencies with known security issues.';

    
/**
     * The severity of the analyzer.
     *
     * @var string|null
     */
    
public $severity self::SEVERITY_CRITICAL;

    
/**
     * The time to fix in minutes.
     *
     * @var int|null
     */
    
public $timeToFix 60;

    
/**
     * The result of the vulnerability scan.
     *
     * @var array
     */
    
public $result;

    
/**
     * Get the error message describing the analyzer insights.
     *
     * @return string
     */
    
public function errorMessage()
    {
        return 
"Your application has a total of ".count($this->result)." known vulnerabilities in the application "
            
."dependencies. This can be very dangerous and you must resolve this by either applying patch updates or "
            
."removing the vulnerable dependencies. The packages which have these vulnerabilities include: "
            
.PHP_EOL.$this->listVulnerablePackages();
    }

    
/**
     * Execute the analyzer.
     *
     * @param \Enlightn\Enlightn\Composer $composer
     * @return void
     * @throws \GuzzleHttp\Exception\GuzzleException
     */
    
public function handle(Composer $composer)
    {
        
$parser = new AdvisoryParser((new AdvisoryFetcher)->fetchAdvisories());

        
$dependencies = (new SecurityCheckerComposer)->getDependencies($composer->getLockFile());

        
$this->result = (new AdvisoryAnalyzer($parser->getAdvisories()))->analyzeDependencies($dependencies);

        if (
count($this->result) > 0) {
            
$this->markFailed();
        }
    }

    
/**
     * List the vulnerable packages.
     *
     * @return string
     */
    
public function listVulnerablePackages()
    {
        try {
            return 
collect($this->result)
                ->
map(function ($vulnerability$package) {
                    return 
$package.' ('.$vulnerability['version'].'): '.
                        
collect(data_get($vulnerability'advisories.*.title'))
                        ->
join(', '' and ');
                })->
values()->implode(PHP_EOL);
        } catch (
Throwable $e) {
            return 
json_encode($this->result);
        }
    }
}

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0067 ]--