Hi Pierre,

On Fri, Feb 6, 2015 at 10:39 AM, Pierre Joye <pierre....@gmail.com> wrote:

> I do not put high value in this ISO ;-)
>

I am :)  Almost all of my clients are ISMS or similar certified.

However, back to this exact feature. I am not convinced it is the
> right way, there are many cases required more than just checking valid
> code (<?php ...), like bash bang lines, phar or other script
> archives-like solutions. And even with this solution, a compromised
> server (via a web app or other) could still do whatever they want with
> php scripts if the web server is not configured correctly.
>

With this proposal, <?php is allowed only at the top of a file.
For example, one of the easiest way to take over servers is embed
script into session data files. This is prevented effectively.

Users who allows phar/etc file uploads, they may have encryption or
compression as mitigation. This mitigation works well, but we cannot
enforce all users to adopt. It requires additional code/CPU resource...
It may ruin usability also. e.g. Files compressed by lzo or any other
fancy algorithms are not easily accessed.

I suggest users to configure their OS to protect all kinds of file
reading/writing
attacks. I agree 100%.

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to