Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

An error occured: SimpleXML not loaded.<!DOCTYPE html> <html lang="en-GB"> <head> ..

Decoded Output download

<?  An error occured: SimpleXML not loaded.<!DOCTYPE html> 
 
<html lang="en-GB"> 
 
	<head> 
		<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> 
 
		<title>Vulnerability: File Upload :: Dr Sepehr's Forensics Fun -- stitching (DVWA) v1.10 *Development*</title> 
 
		<link rel="stylesheet" type="text/css" href="../../dvwa/css/main.css" /> 
 
		<link rel="icon" type="\image/ico" href="../../favicon.ico" /> 
 
		<script type="text/javascript" src="../../dvwa/js/dvwaPage.js"></script> 
 
	</head> 
 
	<body class="home"> 
		<div id="container"> 
 
			<div id="header"> 
 
				<img src="../../dvwa/images/logo.png" alt="Damn Vulnerable Web Application" /> 
 
			</div> 
 
			<div id="main_menu"> 
 
				<div id="main_menu_padded"> 
				<ul class="menuBlocks"><li class=""><a href="../../.">Home</a></li> 
<li class=""><a href="../../instructions.php">Instructions</a></li> 
<li class=""><a href="../../setup.php">Setup / Reset DB</a></li> 
</ul><ul class="menuBlocks"><li class=""><a href="../../vulnerabilities/brute/">Brute Force</a></li> 
<li class=""><a href="../../vulnerabilities/exec/">Command Injection</a></li> 
<li class=""><a href="../../vulnerabilities/csrf/">CSRF</a></li> 
<li class=""><a href="../../vulnerabilities/fi/.?page=include.php">File Inclusion</a></li> 
<li class="selected"><a href="../../vulnerabilities/upload/">File Upload</a></li> 
<li class=""><a href="../../vulnerabilities/captcha/">Insecure CAPTCHA</a></li> 
<li class=""><a href="../../vulnerabilities/sqli/">SQL Injection</a></li> 
<li class=""><a href="../../vulnerabilities/sqli_blind/">SQL Injection (Blind)</a></li> 
<li class=""><a href="../../vulnerabilities/weak_id/">Weak Session IDs</a></li> 
<li class=""><a href="../../vulnerabilities/xss_d/">XSS (DOM)</a></li> 
<li class=""><a href="../../vulnerabilities/xss_r/">XSS (Reflected)</a></li> 
<li class=""><a href="../../vulnerabilities/xss_s/">XSS (Stored)</a></li> 
<li class=""><a href="../../vulnerabilities/csp/">CSP Bypass</a></li> 
<li class=""><a href="../../vulnerabilities/javascript/">JavaScript</a></li> 
</ul><ul class="menuBlocks"><li class=""><a href="../../security.php">DVWA Security</a></li> 
<li class=""><a href="../../phpinfo.php">PHP Info</a></li> 
<li class=""><a href="../../about.php">About</a></li> 
</ul><ul class="menuBlocks"><li class=""><a href="../../logout.php">Logout</a></li> 
</ul> 
				</div> 
 
			</div> 
 
			<div id="main_body"> 
 
				 
<div class="body_padded"> 
	<h1>Vulnerability: File Upload</h1> 
 
	 
 
	<div class="vulnerable_code_area"> 
		<form enctype="multipart/form-data" action="#" method="POST"> 
			<input type="hidden" name="MAX_FILE_SIZE" value="100000" /> 
			Choose an image to upload:<br /><br /> 
			<input name="uploaded" type="file" /><br /> 
			<br /> 
			<input type="submit" name="Upload" value="Upload" /> 
 
		</form> 
		 
	</div> 
 
	<h2>More Information</h2> 
	<ul> 
		<li><a href="https://www.owasp.org/index.php/Unrestricted_File_Upload" target="_blank">https://www.owasp.org/index.php/Unrestricted_File_Upload</a></li> 
		<li><a href="https://www.acunetix.com/websitesecurity/upload-forms-threat/" target="_blank">https://www.acunetix.com/websitesecurity/upload-forms-threat/</a></li> 
	</ul> 
</div> 
				<br /><br /> 
				 
 
			</div> 
 
			<div class="clear"> 
			</div> 
 
			<div id="system_info"> 
				<input type="button" value="View Help" class="popup_button" id='help_button' data-help-url='../../vulnerabilities/view_help.php?id=upload&security=low&locale=en' )"> <input type="button" value="View Source" class="popup_button" id='source_button' data-source-url='../../vulnerabilities/view_source.php?id=upload&security=low' )"> <div align="left"><em>Username:</em> admin<br /><em>Security Level:</em> low<br /><em>Locale:</em> en<br /><em>PHPIDS:</em> enabled</div> 
			</div> 
 
			<div id="footer"> 
 
				<p>Damn Vulnerable Web Application (DVWA) v1.10 *Development*</p> 
				<script src='../..//dvwa/js/add_event_listeners.js'></script> 
 
			</div> 
 
		</div> 
 
	</body> 
 
</html> ?>

Did this file decode correctly?

Original Code

An error occured: SimpleXML not loaded.<!DOCTYPE html>

<html lang="en-GB">

	<head>
		<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

		<title>Vulnerability: File Upload :: Dr Sepehr's Forensics Fun -- stitching (DVWA) v1.10 *Development*</title>

		<link rel="stylesheet" type="text/css" href="../../dvwa/css/main.css" />

		<link rel="icon" type="\image/ico" href="../../favicon.ico" />

		<script type="text/javascript" src="../../dvwa/js/dvwaPage.js"></script>

	</head>

	<body class="home">
		<div id="container">

			<div id="header">

				<img src="../../dvwa/images/logo.png" alt="Damn Vulnerable Web Application" />

			</div>

			<div id="main_menu">

				<div id="main_menu_padded">
				<ul class="menuBlocks"><li class=""><a href="../../.">Home</a></li>
<li class=""><a href="../../instructions.php">Instructions</a></li>
<li class=""><a href="../../setup.php">Setup / Reset DB</a></li>
</ul><ul class="menuBlocks"><li class=""><a href="../../vulnerabilities/brute/">Brute Force</a></li>
<li class=""><a href="../../vulnerabilities/exec/">Command Injection</a></li>
<li class=""><a href="../../vulnerabilities/csrf/">CSRF</a></li>
<li class=""><a href="../../vulnerabilities/fi/.?page=include.php">File Inclusion</a></li>
<li class="selected"><a href="../../vulnerabilities/upload/">File Upload</a></li>
<li class=""><a href="../../vulnerabilities/captcha/">Insecure CAPTCHA</a></li>
<li class=""><a href="../../vulnerabilities/sqli/">SQL Injection</a></li>
<li class=""><a href="../../vulnerabilities/sqli_blind/">SQL Injection (Blind)</a></li>
<li class=""><a href="../../vulnerabilities/weak_id/">Weak Session IDs</a></li>
<li class=""><a href="../../vulnerabilities/xss_d/">XSS (DOM)</a></li>
<li class=""><a href="../../vulnerabilities/xss_r/">XSS (Reflected)</a></li>
<li class=""><a href="../../vulnerabilities/xss_s/">XSS (Stored)</a></li>
<li class=""><a href="../../vulnerabilities/csp/">CSP Bypass</a></li>
<li class=""><a href="../../vulnerabilities/javascript/">JavaScript</a></li>
</ul><ul class="menuBlocks"><li class=""><a href="../../security.php">DVWA Security</a></li>
<li class=""><a href="../../phpinfo.php">PHP Info</a></li>
<li class=""><a href="../../about.php">About</a></li>
</ul><ul class="menuBlocks"><li class=""><a href="../../logout.php">Logout</a></li>
</ul>
				</div>

			</div>

			<div id="main_body">

				
<div class="body_padded">
	<h1>Vulnerability: File Upload</h1>

	

	<div class="vulnerable_code_area">
		<form enctype="multipart/form-data" action="#" method="POST">
			<input type="hidden" name="MAX_FILE_SIZE" value="100000" />
			Choose an image to upload:<br /><br />
			<input name="uploaded" type="file" /><br />
			<br />
			<input type="submit" name="Upload" value="Upload" />

		</form>
		
	</div>

	<h2>More Information</h2>
	<ul>
		<li><a href="https://www.owasp.org/index.php/Unrestricted_File_Upload" target="_blank">https://www.owasp.org/index.php/Unrestricted_File_Upload</a></li>
		<li><a href="https://www.acunetix.com/websitesecurity/upload-forms-threat/" target="_blank">https://www.acunetix.com/websitesecurity/upload-forms-threat/</a></li>
	</ul>
</div>
				<br /><br />
				

			</div>

			<div class="clear">
			</div>

			<div id="system_info">
				<input type="button" value="View Help" class="popup_button" id='help_button' data-help-url='../../vulnerabilities/view_help.php?id=upload&security=low&locale=en' )"> <input type="button" value="View Source" class="popup_button" id='source_button' data-source-url='../../vulnerabilities/view_source.php?id=upload&security=low' )"> <div align="left"><em>Username:</em> admin<br /><em>Security Level:</em> low<br /><em>Locale:</em> en<br /><em>PHPIDS:</em> enabled</div>
			</div>

			<div id="footer">

				<p>Damn Vulnerable Web Application (DVWA) v1.10 *Development*</p>
				<script src='../..//dvwa/js/add_event_listeners.js'></script>

			</div>

		</div>

	</body>

</html>

Function Calls

None

Variables

None

Stats

MD5 d403434c6f3f6340b820388a93680530
Eval Count 0
Decode Time 33 ms