Hi,

2012/4/10 Stas Malyshev <smalys...@sugarcrm.com>:
> Hi!
>
>>> I'm not sure I follow - which PHP vulnerability you are talking about?
>>
>> Local file includes. (LFI)
>
> I'm not sure I understand - where's the vulnerability?
>
>> There is a null byte protection for LFI and I really like to the protection.
>> It's also beneficial to other problems. However, it would not help codes
>> like "include $_REQUEST['var']"
>
> Don't write such code. It's like saying exec() function is a
> "vulnerability" in libc. You instruct PHP to run code based on user
> input - that's what PHP will be doing, it's not a "vulnerability" by any
> definition.

I agree. Programmer should not write that.

I would not propose the RFC if PHP is used as embedded languages mainly
or the vulnerability is non fatal. By making embedded mode non mandatory,
almost all issues will be gone. Why shouldn't we?

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to