|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2018-07-27 02:00 UTC] rasmus@php.net
-Status: Open
+Status: Not a bug
[2018-07-27 02:00 UTC] rasmus@php.net
[2018-07-27 02:56 UTC] guilhermeassmannn at gmail dot com
[2018-07-27 10:24 UTC] a at b dot c dot de
[2018-07-27 11:29 UTC] rasmus@php.net
[2019-01-28 05:29 UTC] aa963577242 at gmail dot com
[2019-01-28 05:41 UTC] aa963577242 at gmail dot com
[2019-01-28 06:47 UTC] spam2 at rhsoft dot net
[2019-01-28 09:02 UTC] yohgaki@php.net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Fri Nov 07 07:00:02 2025 UTC |
Description: ------------ The bug is more related to when we send a string with encode to the strpos(), when we sent a string with double encode we were able to bypass the verification, using %2570hp if the case is like strpos($string, "php"). Test script: --------------- $x = $_GET['x']; //?x=file:///var/www/html/readme.%2570hp $pos = strpos($x,"php"); if($pos){ exit("denied"); } $ch = curl_init(); curl_setopt($ch,CURLOPT_URL,"$x"); curl_setopt($ch,CURLOPT_RETURNTRANSFER,true); $result = curl_exec($ch); echo $result; Expected result: ---------------- denied Actual result: -------------- <?php //readme ?>