3v4l.org

run code in 300+ PHP versions simultaneously
<html><body> <form enctype="multipart/form-data" action="_URL_" method="post"> <input type="hidden" name="MAX_FILE_SIZE" value="30000"> Invia questo file: <input name="userfile" type="file"> <input type="submit" value="Invia File"> </form> <?php $uploaddir = '_UPLOADDIR_'; $FILE_MAX_SIZE = '_DIM_'; if ($_FILES['userfile']['size'] < $MAX_FILE_SIZE) { if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir . $_FILES['userfile']['name'])) { print "Il file è valido, e inviato con successo."; } else { print "Possibile attacco tramite file upload!"; } } else { print "Dimensioni del file eccessive, il file non può superare i ".$MAX_FILE_SIZE." bytes."; } ?> </body></html>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 24
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 20, Position 2 = 22
Branch analysis from position: 20
1 jumps found. (Code = 42) Position 1 = 23
Branch analysis from position: 23
1 jumps found. (Code = 42) Position 1 = 27
Branch analysis from position: 27
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 22
1 jumps found. (Code = 42) Position 1 = 27
Branch analysis from position: 27
Branch analysis from position: 24
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/mFekT
function name:  (null)
number of ops:  29
compiled vars:  !0 = $uploaddir, !1 = $FILE_MAX_SIZE, !2 = $MAX_FILE_SIZE
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    1     0  E >   ECHO                                                     '%3Chtml%3E%3Cbody%3E%0A%3Cform+enctype%3D%22multipart%2Fform-data%22+action%3D%22_URL_%22+method%3D%22post%22%3E%0A%3Cinput+type%3D%22hidden%22+name%3D%22MAX_FILE_SIZE%22+value%3D%2230000%22%3E%0AInvia+questo+file%3A+%3Cinput+name%3D%22userfile%22+type%3D%22file%22%3E%0A%3Cinput+type%3D%22submit%22+value%3D%22Invia+File%22%3E%0A%3C%2Fform%3E%0A'
    8     1        ASSIGN                                                   !0, '_UPLOADDIR_'
    9     2        ASSIGN                                                   !1, '_DIM_'
   10     3        FETCH_R                      global              ~5      '_FILES'
          4        FETCH_DIM_R                                      ~6      ~5, 'userfile'
          5        FETCH_DIM_R                                      ~7      ~6, 'size'
          6        IS_SMALLER                                               ~7, !2
          7      > JMPZ                                                     ~8, ->24
   11     8    >   INIT_FCALL                                               'move_uploaded_file'
          9        FETCH_R                      global              ~9      '_FILES'
         10        FETCH_DIM_R                                      ~10     ~9, 'userfile'
         11        FETCH_DIM_R                                      ~11     ~10, 'tmp_name'
         12        SEND_VAL                                                 ~11
         13        FETCH_R                      global              ~12     '_FILES'
         14        FETCH_DIM_R                                      ~13     ~12, 'userfile'
         15        FETCH_DIM_R                                      ~14     ~13, 'name'
         16        CONCAT                                           ~15     !0, ~14
         17        SEND_VAL                                                 ~15
         18        DO_ICALL                                         $16     
         19      > JMPZ                                                     $16, ->22
   12    20    >   ECHO                                                     'Il+file+%C3%A8+valido%2C+e+inviato+con+successo.'
         21      > JMP                                                      ->23
   14    22    >   ECHO                                                     'Possibile+attacco+tramite+file+upload%21'
         23    > > JMP                                                      ->27
   17    24    >   CONCAT                                           ~17     'Dimensioni+del+file+eccessive%2C+il+file+non+pu%C3%B2+superare+i+', !2
         25        CONCAT                                           ~18     ~17, '+bytes.'
         26        ECHO                                                     ~18
   20    27    >   ECHO                                                     '%3C%2Fbody%3E%3C%2Fhtml%3E'
         28      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
159.44 ms | 1396 KiB | 15 Q