> Honestly, I don't see how allowing exec/passthru/proc_open is a security risk.
> These are just tools. We're talking about programming language - if you're
> running PHP script as user X you should expect that it could do anything that 
> user
> X can do. If you don't trust this script, just don't run it

Depends on how you look at if exec($_GET['param']) is a language responsibility 
or programmers?

On the same level you can then expect that programmer X always uses '<?php' and 
then in no way this historical alias impacts his ability to use whatever 
existing or new features or language constructs will be implemented in future.


> https://www.php.net/manual/en/language.basic-syntax.phptags.php
> 
> "PHP also allows for short open tag <? (which is discouraged since it is only
> available if enabled using the short_open_tag php.ini configuration file 
> directive,
> or if PHP was configured with the --enable-short-tags option)."

Which is actually the other way around - enabled by default / disabled if 
configured via ini.

It feels most people who argue about the feature (are not in the burn it with 
fire and everyone who uses them should just go away) would be fine (enough) if 
it aligned to what's written in the documentation and then make deliberate 
decision to enable those.

rr 


--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to