On Mon, 23 Oct 2006 10:38:31 -0700, in php.internals
[EMAIL PROTECTED] (Rasmus Lerdorf) wrote:

>I had left out SERVER filtering in the initial version for much the same 
>reasoning, but it turns out that a good chunk of holes were due to the 
>fact that people used $_SERVER['REQUEST_URI'] unfiltered.  Trying to 
>teach people which SERVER vars are safe and which aren't isn't a fun 
>task and the whole point of the filter extension is to take away the 
>guessing game.

More well-known, the same goes for the HTTP headers populated in
_SERVER as well, even though some might be less obvious than other.

HTTP_HOST could be tainted as well in some cases where a DNS entry and
ServerAlias of *.example.com exists.

An attacker could trick a user into visiting
www.%22%3EXSS.example.com which at least IE6 would accept as a valid
URL.

-- 
- Peter Brodersen

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to