Are they kidding us?
Full Text RSS Feed Builder, despite being really useful (it completes partial RSS feed into a complete one for you), they think they can freely modify the links in the completed feed they give us and to remplace them by something along those lines http://redirect.viglink.com?key=11fe087258b6fc0532a5ccfc924805c0&u=http%3A%2F%2Fwww.realURL.fr%2Fexample.php in order to track us.
Well, fuck this (sorry for the slang), let's correct that, shall we?
The code:
<?php error_reporting(-1);
if(!isset($_GET['url']))
{
?>
<title>Fulltextrssfeed Purifier</title>
<h1>Are they kidding us?</h1>
<a href="http://fulltextrssfeed.com/">Full Text RSS Feed Builder</a>, despite being really useful (it completes partial RSS feed into a complete one for you), they think they can freely modify the links in the completed feed they give us and to remplace them by something along those lines <em>http://redirect.viglink.com?key=11fe087258b6fc0532a5ccfc924805c0&u=<strong>http%3A%2F%2Fwww.realURL.fr%2Fexample.php</strong></em> in order to track us.<br /><br />
Well, <strong>fuck this</strong> <em>(sorry for the slang)</em>, let's correct that, <strong>shall we?</strong>
<form action="?" method="get" style="margin-top: 1em">
<label for="your_URL" style="font-weight: bold">Your URL:</label> <input id="your_URL" name="url" type="text" placeholder="Type your URL" /> <input type="submit" value="Correct it!" /> <em>(Without the "http" at the begining. Ex: lehollandaisvolant.net/rss.php?full)</em>
</form>
<h2>The code:</h2>
<?php
highlight_file(__FILE__);
exit();
}
if(false) # Disabled for security reasons: Could be used to perfom XSS attacks. Only use it with RSS feeds you trust and make sure no one else except you use it.
{
echo preg_replace_callback('#http://redirect\.viglink\.com\?key=.*&u=(.*)(?=")#U',
function($fakeURL)
{
return htmlspecialchars(urldecode($fakeURL[1]));
},
file_get_contents('http://fulltextrssfeed.com/'.$_GET['url'])
);
}
?>