Commit graph

17 commits

Author SHA1 Message Date
Miraty
0504a5ce27 fix SYNC_TTL > NS_SYNC_TTL 2023-09-19 20:33:44 +02:00
Miraty
e6cc5eed1c check.php: random subdomain for /ht/add-subdomain 2023-08-18 15:10:49 +02:00
Miraty
4217602b46 check.php: fix HTTPS_PORT migration to config.ini 2023-08-18 03:10:30 +02:00
Miraty
c13555ae3b Output more information about what check.php does 2023-08-18 03:04:47 +02:00
Miraty
aa91004ab5 Move check.php settings to config.ini 2023-08-14 21:07:42 +02:00
Miraty
bb937526a7 check.php: use null coalescing operator ("??") more 2023-08-14 18:20:47 +02:00
Miraty
0340c24a81 Use kdig() everywhere appropriate 2023-08-13 18:52:34 +02:00
Miraty
2570d09ba9 Add reg/edit.php and regParseRecord() 2023-07-31 01:13:06 +02:00
Miraty
40e67b0c0c declare(strict_types=1); 2023-07-17 21:15:18 +02:00
Miraty
3ddbc7cf1a reg: sync DS/NS using CDS/CSYNC from child zone 2023-07-16 21:00:38 +02:00
Miraty
1d856e1e2e ns/sync: translations and bugfixes 2023-06-26 04:13:52 +02:00
Miraty
858d6e8d02 Add ns/sync and jobs/ns-syncs 2023-06-24 16:54:36 +02:00
Miraty
b2fdc0c925 Fix jobs/check.php 2023-06-21 01:23:19 +02:00
Miraty
d8b4ee90bb check.php: test domain transfers 2023-06-20 02:32:36 +02:00
Miraty
973a129079 Add type in functions signatures 2023-06-20 00:36:58 +02:00
Miraty
7f7bcadb58 Fix important vulnerability in reg/ds.php + exescape
In page reg/ds.php, POST parameter 'key' was directly sent to shell, allowing for remote arbitrary commands execution.

This commit fixes this vulnerability, and uses a new function to automatically escape every shell command arguments as an additional generic protection.
2023-06-19 02:15:43 +02:00
Miraty
e4ae765486 init.php + jobs + job to delete old testing accounts 2023-06-08 17:36:44 +02:00