Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:82353 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 48977 invoked from network); 10 Feb 2015 08:59:28 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 10 Feb 2015 08:59:28 -0000 Authentication-Results: pb1.pair.com header.from=markus@fischer.name; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=markus@fischer.name; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain fischer.name from 62.179.121.33 cause and error) X-PHP-List-Original-Sender: markus@fischer.name X-Host-Fingerprint: 62.179.121.33 fep13.mx.upcmail.net Solaris 10 (beta) Received: from [62.179.121.33] ([62.179.121.33:48536] helo=fep13.mx.upcmail.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 32/FD-47508-C68C9D45 for ; Tue, 10 Feb 2015 03:59:26 -0500 Received: from edge02.upcmail.net ([192.168.13.237]) by viefep13-int.chello.at (InterMail vM.8.01.05.13 201-2260-151-135-20130320) with ESMTP id <20150210085921.MRHF12567.viefep13-int.chello.at@edge02.upcmail.net> for ; Tue, 10 Feb 2015 09:59:21 +0100 Received: from mail02.home ([213.47.1.174]) by edge02.upcmail.net with edge id qYz41p01M3lFLNl01Yz4xC; Tue, 10 Feb 2015 09:59:05 +0100 X-SourceIP: 213.47.1.174 Received: from mail02.home ([192.168.1.14] helo=lv426.local) by mail02.home with esmtp (Exim 4.72) (envelope-from ) id 1YL6fA-0006qt-5g for internals@lists.php.net; Tue, 10 Feb 2015 09:59:20 +0100 Message-ID: <54D9C867.9030107@fischer.name> Date: Tue, 10 Feb 2015 09:59:19 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.4.0 MIME-Version: 1.0 To: internals@lists.php.net References: In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Spam_score: -2.9 X-Spam_score_int: -28 X-Spam_bar: -- X-Spam_report: Spam detection software, running on the system "scanner01.home", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: On 10.02.15 01:52, Yasuo Ohgaki wrote: > Some of you are tired with this topic, but please take a look the RFC > > [RFC] Script only includes - this is 3rd version. > https://wiki.php.net/rfc/script_only_include > > Please let me know what you like or dislike. [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Subject: Re: [PHP-DEV] [RFC][DISCUSSION] Script only includes From: markus@fischer.name (Markus Fischer) On 10.02.15 01:52, Yasuo Ohgaki wrote: > Some of you are tired with this topic, but please take a look the RFC > > [RFC] Script only includes - this is 3rd version. > https://wiki.php.net/rfc/script_only_include > > Please let me know what you like or dislike. How exactly does this detection work? > move_uploaded_file() searches “start tag” token if it is located as the first token. What constitutes "first token" in this context? Would this be detected as a PHP file? -----8<---- root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin