Yes when I checked out the manual page for eval() it did occur to me that it
did open up significant potential for abuse.  As it happens I am passing
user supplied values into these variables, but I validate all my input
anyway to prevent people from modifying my queries etc..  I have observed
that PHP doesn't seem to be very naturally defensive but I guess no Server
Side scripting language is, except maybe JSP.

Cheers,
James

--
--------------------------------------------------------
www.jholt.co.uk : affordable business website solutions
www.htpshareware.com : software for the disorganized
--------------------------------------------------------

"You don't needs eyes to see, you need vision" - Maxi Jazz

"Mike Ford" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]
> On 30 January 2004 12:35, jimbo wrote:
>
> > Great - thanks v. much Mike.  I don't know why there was no mention of
> > eval() in the section of the manual on Variable Parsing.
>
> Possibly because they didn't want to get into the security issues
involved.
> It sounds like you're ok there, as you only intend putting very controlled
> values into the database.
>
> The problem comes if you're potentially eval()-ing user-supplied values
that
> have been insufficiently validated.  Just suppose, for example, that it
was
> possible for a user to somehow get a value such as 'system("rm
> /etc/passwds")' inserted into the database in a field that you then
> eval()...
>
> Cheers!
>
> Mike
>
> ---------------------------------------------------------------------
> Mike Ford,  Electronic Information Services Adviser,
> Learning Support Services, Learning & Information Services,
> JG125, James Graham Building, Leeds Metropolitan University,
> Beckett Park, LEEDS,  LS6 3QS,  United Kingdom
> Email: [EMAIL PROTECTED]
> Tel: +44 113 283 2600 extn 4730      Fax:  +44 113 283 3211

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to