topical media & game development

talk show tell print

professional-sql-12-public-files-exploit-04.php / php



  <?php
  // Assume _GET['file'] has been filtered appropriately to prevent
  // directory traversal and stored as file
  
  echo '<p>Information about the requested file:</p>';
  
  echo '<pre>';
  echo shell_exec('ls -hl --color=never ' . file);
  echo '</pre>';
  ?>
  


(C) Æliens 20/2/2008

You may not copy or print any of this material without explicit permission of the author or the publisher. In case of other copyright issues, contact the author.