Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!! PLEASE BE ATTENTIVE !!!
From: Maarten <fulldisc () ultratux org>
Date: Sat, 3 Jul 2004 12:56:50 +0200

On Saturday 03 July 2004 11:09, Duncan Hill wrote:
On Saturday 03 July 2004 05:40, Frog M () n wrote:


php.ini
register_globals = off
and/or
allow_url_fopen = false

For php versions < 4.0.4, compile with --disable-url-fopen-wrapper

Basic comprehension skills, and a quick check of the PHP manual tells you
all you need to know.  The PHP folks have advocated for over a year to
disable register_globals and use the super globals instead.

Indeed.  But the fact that many READMEs of php code still say something like 
"Sadly, there is a bug in <distribution foobar> in the php.ini file. Set 
register_globals to ON, otherwise this software will not function."
That they even dare calling it a "bug" is beyond arrogance.

Maarten

-- 
Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault