![]() |
PHP Code:
|
Quote:
Quote:
|
Quote:
--------------- Added [DATE]1409646066[/DATE] at [TIME]1409646066[/TIME] --------------- Quote:
Code:
$vbulletin->input->clean_gpc('r', 'do', TYPE_STR); |
Quote:
PHP Code:
PHP Code:
|
Quote:
|
I can't see anything wrong now, and I don't have time right now to test it
Maybe this code could make a difference PHP Code:
|
There is a $vbulletin->GPC_exists[] array, so you could try this:
Code:
$vbulletin->input->clean_gpc('r', 'do', TYPE_STR); Another thing you could do is just make 'siterules' the default 'else': Code:
$vbulletin->input->clean_gpc('r', 'do', TYPE_STR); BTW, I'm not a php expert so I'm not going to argue with what's correct and what's "evil", but I would say that there was nothing actually wrong with what you originally had (as far as introducing vulnerabilities), and in fact the vb scripts do it that way (just for the 'do' variable). |
All times are GMT. The time now is 09:52 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|