ShellBanner
System:Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686
Software:Apache. PHP/5.3.6-13ubuntu3.10
ID:uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
Safe Mode:OFF
Open_Basedir:OFF
Freespace:26.03 GB of 70.42 GB (36.97%)
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,

/ http/ map/ site/ sql_control/ libraries/ - drwxr-sr-x

Directory:
Viewing file:     cleanup.lib.php (1.34 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/* vim: set expandtab sw=4 ts=4 sts=4: */
/**
 * Functions for cleanup of user input.
 *
 * @package phpMyAdmin
 */

/**
 * Removes all variables from request except whitelisted ones.
 *
 * @param string list of variables to allow
 * @return nothing
 * @access public
 */
function PMA_remove_request_vars(&$whitelist)
{
    
// do not check only $_REQUEST because it could have been overwritten
    // and use type casting because the variables could have become
    // strings
    
$keys array_keys(array_merge((array)$_REQUEST, (array)$_GET, (array)$_POST, (array)$_COOKIE));

    foreach(
$keys as $key) {
        if (! 
in_array($key$whitelist)) {
            unset(
$_REQUEST[$key], $_GET[$key], $_POST[$key], $GLOBALS[$key]);
        } else {
            
// allowed stuff could be compromised so escape it
            // we require it to be a string
            
if (isset($_REQUEST[$key]) && ! is_string($_REQUEST[$key])) {
                unset(
$_REQUEST[$key]);
            }
            if (isset(
$_POST[$key]) && ! is_string($_POST[$key])) {
                unset(
$_POST[$key]);
            }
            if (isset(
$_COOKIE[$key]) && ! is_string($_COOKIE[$key])) {
                unset(
$_COOKIE[$key]);
            }
            if (isset(
$_GET[$key]) && ! is_string($_GET[$key])) {
                unset(
$_GET[$key]);
            }
        }
    }
}
?>
Command:
Quick Commands:
Upload:
[Read-Only] Max size: 100MB
PHP Filesystem: <@ Ú
Search File:
regexp
Create File:
Overwrite [Read-Only]
View File:
Mass Defacement:
[+] Main Directory: [+] Defacement Url:
LmfaoX Shell - Private Build [BETA] - v0.1 -; Generated: 0.3078 seconds