[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87acgpmp10.fsf@mid.deneb.enyo.de>
Date: Mon Oct 31 20:04:44 2005
From: fw at deneb.enyo.de (Florian Weimer)
Subject: Re: Advisory 18/2005: PHP Cross Site Scripting
(XSS) Vulnerability in phpinfo()
* Stefan Esser:
> http://viewcvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c.diff?r1=1.245.2.2&r2=1.245.2.3
>
> I hope this is enough to convince you... (because your bug report has
> nothing todo with arrays not beeing escaped at all)
With current PHP, his URL happens to trigger the array escape bug,
though. Matthew's criticims of PHP's development practices is not
completely unfounded, I'm afraid.
Powered by blists - more mailing lists