php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Doc Bug #60985 filesystem functions null-byte safe now
Submitted: 2012-02-06 10:04 UTC Modified: 2020-09-30 13:21 UTC
From: tyrael@php.net Assigned:
Status: Verified Package: Filesystem function related
PHP Version: Irrelevant OS: irrevelant
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: tyrael@php.net
New email:
PHP Version: OS:

 

 [2012-02-06 10:04 UTC] tyrael@php.net
Description:
------------
https://bugs.php.net/bug.php?id=39863 got fixed so since php 5.3.4, the file 
system functions seems to be immune to the null byte poisioning.
which means the the http://php.net/manual/en/security.filesystem.nullbytes.php 
page needs a little bit refactoring (or maybe a complete removal) as the example 
there isn't vulnerable anymore.


Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2018-12-30 15:58 UTC] girgias@php.net
Has it been completely fixed?
There is a note saying this bug still exists with the include and require functions.
https://php.net/manual/en/security.filesystem.nullbytes.php#116069
 [2020-09-30 13:21 UTC] cmb@php.net
-Status: Open +Status: Verified
 [2020-09-30 13:21 UTC] cmb@php.net
Yes, that include/require have been also fixed back then; they
just don't report anything about an invalid path.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Mon Nov 25 10:01:32 2024 UTC