Ilia Alshanetsky: > And here is your first exploit, let's say we say > mysql_real_escape_string() takes tainted data and makes it untainted, > what happens when this "safe" data is passed to exec().
You need a malicous code writer to have an exploit. As far as I know, PHP is not a platform for secuerly executing hostile code. > You are going > to need to deal with different levels of taint-untainted and 1 bit is > not going to give you that flexibility. You are going to need an int/ > long, maybe even a long long. Sandboxing malicious code requires a lot more than taint levels. I'll be happy to provide that, but it's outside of the contribution that I'm trying to make for 2007. Right now I am merely targeting the non-malicious programmers. Wuietse -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php