Here are my cents to this RFC, as it just keeps popping in in my inbox and its 
beginning to be one that I wish I could ignore.

First, … file extensions? A default Apache configuration and some Nginx 
configurations actually accept more than one file extension. This RFC does not 
include any way to specify a variety of extensions that should be blocked, 
ignored or treated else.

Your PHP code is only so secure as you make it. If you are in need for such an 
RFC just to block a few „rare cases“, then I would rather suggest you to either 
check your source or hand it to a professional to get it counter-checked.

Besides of that, it is never a good idea to let a user upload /everything/ that 
they want to. A proper MIME-type check can be helpful in these scenarios.

Again, I would not vote for the RFC and I do not think positive about it, since 
I see it very unnecessary.

Thus, if an attacker really wants to get into your business, they have more 
than one way to do so - for instance, exploiting the web server itself.

Kind regards,
Ingwie

> Am 25.02.2015 um 05:57 schrieb Stanislav Malyshev <smalys...@gmail.com>:
> 
> Hi!
> 
>> I have to at least php:// 
>> php://input or php://stdin 
>> allows attacker script execution via POST if it's allowed
>> by allow_url_include=On.
> 
> allow_url_include=On means it's allowed. That's what "on" setting is
> for. Production setting should always be "off".
> -- 
> Stas Malyshev
> smalys...@gmail.com
> 
> -- 
> PHP Internals - PHP Runtime Development Mailing List
> To unsubscribe, visit: http://www.php.net/unsub.php
> 


--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to