Intrusion Exploit
Server: LiteSpeed
System: Linux cisadane.iixcp.rumahweb.net 5.14.0-427.42.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Nov 1 14:58:02 EDT 2024 x86_64
User: lenf4658 (1805)
PHP: 8.4.19
Disabled: NONE
Upload Files
File: //lib/python3.9/site-packages/ansible_collections/ansible/windows/plugins/modules/slurp.ps1
#!powershell

# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

#Requires -Module Ansible.ModuleUtils.Legacy

$params = Parse-Args $args -supports_check_mode $true
$src = Get-AnsibleParam -obj $params -name "src" -type "path" -aliases "path" -failifempty $true

$result = @{
    changed = $false
}

If (Test-Path -LiteralPath $src -PathType Leaf) {
    $bytes = [System.IO.File]::ReadAllBytes($src)
    $result.content = [System.Convert]::ToBase64String($bytes)
    $result.encoding = "base64"
    Exit-Json $result
}
ElseIf (Test-Path -LiteralPath $src -PathType Container) {
    Fail-Json $result "Path $src is a directory"
}
Else {
    Fail-Json $result "Path $src is not found"
}