Kernel : Linux vmi616275.contaboserver.net 5.4.0-84-generic #94-Ubuntu SMP Thu Aug 26 20:27:37 UTC 2021 x86_64
Disable function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Safe mode : OFF
Host : diestoffstrasse.com | Server ip : 127.0.0.1 | Your ip : 127.0.0.1 | Time @ Server : 24 Aug 2025 07:43:36
MySQL : OFF | MSSQL : OFF | cURL : ON | Oracle : OFF | wget : ON | Perl : ON

/home/dev2.destoffenstraat.com/vendor-1/magento/framework/HTTP/Test/Unit/Adapter/

HOME about upload exec mass file domain root vuln newfile newfolder kill me

File Path : /home/dev2.destoffenstraat.com/vendor-1/magento/framework/HTTP/Test/Unit/Adapter/CurlTest.php

<?php /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ declare(strict_types=1); namespace Magento\Framework\HTTP\Test\Unit\Adapter; use Magento\Framework\HTTP\Adapter\Curl; use PHPUnit\Framework\TestCase; class CurlTest extends TestCase { /** * @var Curl */ protected $model; /** * @var \Closure */ public static $curlExectClosure; protected function setUp(): void { require_once __DIR__ . '/_files/curl_exec_mock.php'; $this->model = new Curl(); } /** * @param string $response * @dataProvider readDataProvider */ public function testRead($response) { self::$curlExectClosure = function () use ($response) { return $response; }; $this->assertEquals(file_get_contents(__DIR__ . '/_files/curl_response_expected.txt'), $this->model->read()); } /** * @return array */ public function readDataProvider() { return [ [file_get_contents(__DIR__ . '/_files/curl_response1.txt')], [file_get_contents(__DIR__ . '/_files/curl_response2.txt')], ]; } }