3v4l.org

run code in 300+ PHP versions simultaneously
<?php # Payload: { 'token': 0 } $payload = json_decode(json_encode(array('token' => 0))); $token = 'RaNdOmStRiNg1!'; echo "[PAYLOAD] " . gettype($payload->token) . "({$payload->token}) - "; echo "[TOKEN] {{$token}} - "; if($token != $payload->token) { die('Access Denied'); } echo 'Access Granted: Type Juggling Bypass';
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 25
Branch analysis from position: 24
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 25
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/ckEqm
function name:  (null)
number of ops:  27
compiled vars:  !0 = $payload, !1 = $token
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    5     0  E >   INIT_FCALL                                               'json_decode'
          1        INIT_FCALL                                               'json_encode'
          2        SEND_VAL                                                 <array>
          3        DO_ICALL                                         $2      
          4        SEND_VAR                                                 $2
          5        DO_ICALL                                         $3      
          6        ASSIGN                                                   !0, $3
    6     7        ASSIGN                                                   !1, 'RaNdOmStRiNg1%21'
    8     8        FETCH_OBJ_R                                      ~6      !0, 'token'
          9        GET_TYPE                                         ~7      ~6
         10        CONCAT                                           ~8      '%5BPAYLOAD%5D+', ~7
         11        ROPE_INIT                                     3  ~11     '%28'
         12        FETCH_OBJ_R                                      ~9      !0, 'token'
         13        ROPE_ADD                                      1  ~11     ~11, ~9
         14        ROPE_END                                      2  ~10     ~11, '%29+-+'
         15        CONCAT                                           ~13     ~8, ~10
         16        ECHO                                                     ~13
    9    17        ROPE_INIT                                     3  ~15     '%5BTOKEN%5D+%7B'
         18        ROPE_ADD                                      1  ~15     ~15, !1
         19        ROPE_END                                      2  ~14     ~15, '%7D+-+'
         20        ECHO                                                     ~14
   11    21        FETCH_OBJ_R                                      ~17     !0, 'token'
         22        IS_NOT_EQUAL                                             !1, ~17
         23      > JMPZ                                                     ~18, ->25
   12    24    > > EXIT                                                     'Access+Denied'
   15    25    >   ECHO                                                     'Access+Granted%3A+Type+Juggling+Bypass'
         26      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
138.34 ms | 1001 KiB | 15 Q