Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: PHP Filesystem Interaction

$
0
0
Detected 2 occurrence(s) of ‘(fopen|file)\(.*\$(GET|POST)’: e('Bad parameter!'); } $dir = "/var/www/uploads/$getdir/$getdoctype/"; $type = mime_content_type( $dir . $getfile ); if (file_exists($dir . $getfile)) { header('Content-Type: ' . $type); header('Content-Disposition: attachment;filename=' . $getfile); readfile($dir . $getfile); } else{ echo "File Not Found"; } header('Content-Disposition: attachment;filename="' . $getfile . '"'); $filteredName = preg_replace('/[^a-z0-9.]/i', '', $filename); Source: http://pastebin.com/raw.php?i=VfVzhqMR

Viewing all articles
Browse latest Browse all 2834

Latest Images

Trending Articles



Latest Images