Warning: A few vulnerabilities in this commit, don't use outside a test environment
24 lines
494 B
PHP
24 lines
494 B
PHP
<?php
|
|
|
|
if (isset($_GET["str"]))
|
|
{
|
|
file_put_contents("./input.dat", $_GET["str"]);
|
|
}
|
|
|
|
?>
|
|
|
|
<html>
|
|
<head>
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no" />
|
|
</head>
|
|
<body>
|
|
<form action="./input.php">
|
|
<input name="str" type="text" id="input_str"></input>
|
|
</form>
|
|
<script>
|
|
document.getElementById("input_str").focus();
|
|
document.getElementById("input_str").select();
|
|
</script>
|
|
</body>
|
|
</html>
|