On Thu, 7 Nov 2024, jvoisin wrote:

> The easiest way to kill this vector is to simply limit the number of
> filters that can be chained, as attacks require a at least a couple of
> them, while legitimate use usually use one or two tops, as highlighted
> by arnaud-lb's analysis:
> https://github.com/php/php-src/pull/16699#issuecomment-2462281938
> 
> I sent a pull-request to implement this:
> https://github.com/php/php-src/pull/16699
> 
> What do y'all think about this?

I am not a fan of hardcoding arbitrary limits, or having an ini setting 
for such a limit. I especially think that the suggested limit of 5, or 
even 3, is not a good idea.

The example that the issue links to to fix a vulnaribility in is:

        include $_GET['page'];

Which is... yeah.

cheers,
Derick

-- 
https://derickrethans.nl | https://xdebug.org | https://dram.io

Author of Xdebug. Like it? Consider supporting me: https://xdebug.org/support

mastodon: @derickr@phpc.social @xdebug@phpc.social

Reply via email to