|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2008-07-23 16:55 UTC] pajoye@php.net
[2008-07-23 18:17 UTC] php at displague dot com
[2008-07-23 18:46 UTC] php at displague dot com
[2008-07-24 12:17 UTC] lbarnaud@php.net
[2013-10-01 11:00 UTC] jobindcruz at gmail dot com
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Thu Oct 30 17:00:01 2025 UTC |
Description: ------------ In code where I use filter_input(INPUT_GET, 'id', FILTER_SANITIZE_NUMBER_INT, array('options'=>array('min_range'=>1))); a vulnerability scanner tried to supply a value of <!-- test --> to the id parameter of the page. This filter statement caused $id=='----'. Reproduce code: --------------- $t="<!-- test -->"; $v=filter_var($t, FILTER_SANITIZE_NUMBER_INT, array('options'=>array('min_range'=>1))); Expected result: ---------------- $v==false Actual result: -------------- $v=='----'