[ Mini Kiebo ]
Server: Windows NT DESKTOP-5B8S0D4 6.2 build 9200 (Windows 8 Professional Edition) i586
Path:
D:
/
DATA_RECOVERY
/
ALL BACKUP
/
SISMADAK SERVER
/
22-04-2019
/
xampp
/
phpMyAdmin
/
[
Home
]
File: url.php
<?php /* vim: set expandtab sw=4 ts=4 sts=4: */ /** * URL redirector to avoid leaking Referer with some sensitive information. * * @package PhpMyAdmin */ /** * Gets core libraries and defines some variables */ define('PMA_MINIMUM_COMMON', true); require_once './libraries/common.inc.php'; /** * JavaScript escaping. */ require_once './libraries/js_escape.lib.php'; // Only output the http headers $response = PMA\libraries\Response::getInstance(); $response->getHeader()->sendHttpHeaders(); $response->disable(); if (! PMA_isValid($_REQUEST['url']) || ! preg_match('/^https:\/\/[^\n\r]*$/', $_REQUEST['url']) || ! PMA_isAllowedDomain($_REQUEST['url']) ) { PMA_sendHeaderLocation('./'); } else { // JavaScript redirection is necessary. Because if header() is used // then web browser sometimes does not change the HTTP_REFERER // field and so with old URL as Referer, token also goes to // external site. echo "<script type='text/javascript'> window.onload=function(){ window.location='" , PMA_escapeJsString($_REQUEST['url']) , "'; } </script>"; // Display redirecting msg on screen. // Do not display the value of $_REQUEST['url'] to avoid showing injected content echo __('Taking you to the target site.'); } die();