Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:  <glqdj4$l1e$1@ger.gmane.org>
Date:  Wed, 28 Jan 2009 14:00:42 -0600
From:  Raphael Geissert <atomo64+debian@...il.com>
To: oss-security@...ts.openwall.com
Subject:  Re: CVE id request: php5

Josh Bressers wrote:
[...]
> 
> I may be missing something here, but this looks like an issue where a bad
> script really needs to cause this. Wouldn't it be just as easy to for the
> script author to delete the file in question via a PHP script?
> 

No, please read carefully. If you have a script that doesn't do good input
sanitation but takes a variable from the user's input and uses it as a key it
will end up nuking the .ini file.

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.