[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080925155302.336.qmail@securityfocus.com>
Date: 25 Sep 2008 15:53:02 -0000
From: lmfao@...mail.com
To: bugtraq@...urityfocus.com
Subject: Re: php create_function commond injection vulnerability
Are you kidding ?
As the PHP manual said "if you use double quotes there will be a need to escape the variable names".
In your example you use a function with double quotes, without escaping the variable $sort_by, so
this is not a PHP vulnerability, but a development one.
For this time, don't blame PHP, blame developers.
It's like if I was using mysql_query() without escaping user's inputs...an sql injection, not a PHP vuln ;)
Powered by blists - more mailing lists