Nelson Menezes writes:
 > The potential for inclusion of malicious code is, if
 > anything, a common oversight, not a design flaw.

If it's a common oversight, then it *is* a design flaw.

 > 1. Create an INI_ALL variable that means something like "allow fopen
 > wrappers in include/require" and default it to whatever is thought
 > appropriate -- if it *is* a very common oversight, maybe false.

That would solve the problem.  You could still use the sharp edges of
'include', but you would have to take the sheath off first.

Does anyone disagree with Nelson's suggestion?  If I wrote the patch,
who should I submit it to?  It ought to be pretty small, so I could
post it here, but that's probably not right.

-- 
--My blog is at     blog.russnelson.com         | If you want to find
Crynwr sells support for free software  | PGPok | injustice in economic
521 Pleasant Valley Rd. | +1 315-323-1241       | affairs, look for the
Potsdam, NY 13676-3213  |                       | hand of a legislator.

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to