On Fri, Sep 26, 2014 at 2:01 PM, Tom Perrine <tom.perr...@gmail.com> wrote:

> seem to recall some info from yesterday that the example on escape
> to shell that's in the PHP book is vulnerable.
>

If run via cgi or fastcgi/cgi, very probably. Via mod_php, are there
significant envars or does the context come from somewhere else? (It should
have reasonably direct access to Apache's state instead of needing
envars... but then again, it *is* php-related.)

-- 
brandon s allbery kf8nh                               sine nomine associates
allber...@gmail.com                                  ballb...@sinenomine.net
unix, openafs, kerberos, infrastructure, xmonad        http://sinenomine.net
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to