(12/02/14 23:03), Ondřej Surý wrote:
> That's some noise on the wire...  This fix was never part of PHP
> 5.3.10 and I think all security team just copied this information from
> CVE. (Now I at least know where they got it.)
> 
> And you really need to pull the patch from
> https://bugs.php.net/bug.php?id=61043 before you push out 5.3.11.

Thanks, it becomes clear.

I understand that ...

  1. In PHP 5.3.10 and before,  magic_quotes_gpc is disabled even if it is 
enabled in php.ini.
  2. If my PHP scripts don't depend on magic quote feature, in this case, I 
don't need to apply the patch.

Are these correct?

BTW, According to NVD 
(http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0831),

> CVSS v2 Base Score:7.5 (HIGH) 

> Access Vector: Network exploitable
> Access Complexity: Low
> Authentication: Not required to exploit
> Impact Type:Allows unauthorized disclosure of information; Allows 
> unauthorized modification; Allows disruption of service 

> SQL Injection (CWE-89)

But I think it is totally mistakes. I think it is evaluated as "SQL Injection 
attack vulnerability in *PHP*", but it is not correct. magic_quotes_gpc is just 
a fail-safe (but of course it is tattered) and a script which depends on 
magic_quotes_gpc is intrinsically vulnerable.

-- 
Kousuke Ebihara <kous...@co3k.org>
http://co3k.org/

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to