lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon Oct 31 20:04:44 2005 From: fw at deneb.enyo.de (Florian Weimer) Subject: Re: Advisory 18/2005: PHP Cross Site Scripting (XSS) Vulnerability in phpinfo() * Stefan Esser: > http://viewcvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c.diff?r1=1.245.2.2&r2=1.245.2.3 > > I hope this is enough to convince you... (because your bug report has > nothing todo with arrays not beeing escaped at all) With current PHP, his URL happens to trigger the array escape bug, though. Matthew's criticims of PHP's development practices is not completely unfounded, I'm afraid.
Powered by blists - more mailing lists