Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:86268 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 78818 invoked from network); 16 May 2015 21:07:38 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 16 May 2015 21:07:38 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.218.41 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.218.41 mail-oi0-f41.google.com Received: from [209.85.218.41] ([209.85.218.41:32773] helo=mail-oi0-f41.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 8C/5E-14891-991B7555 for ; Sat, 16 May 2015 17:07:38 -0400 Received: by oica37 with SMTP id a37so105541911oic.0 for ; Sat, 16 May 2015 14:07:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=I0s96/unK2thpoPtYsRt6IUDFS1Yd54R/bTImtUR8OY=; b=mEtU5th+tV1Hsd9UanzZAICRle22OzWIFbZmQlWDl5JzRtS0I5abj3ZweThD1tcwBW o7fF8zR58tJVOfWQibeq5s8auz6q058/M6ws6/BrB1fyi/WrlmvRV173bO/GXbYLdZKQ DukB1mKkOVXcCHE9DhChj2XyAJ//BKBnaGmo/qgm0YyyQbRQ5CuKZgkl+HtloQwADMka hlsH388JsvGM0jnmlmNmCDsxPAhwWbzTs+hPxCkXi0pDMflg+DarQ3KgvYPNcW8tAqSa +BrpdmfFqYxzLg52VffUBU8pPB5BrOpU9Di+S0EUAxga5ChT2vQxtC8TGdja4CivhmEH 3xHg== X-Received: by 10.182.73.168 with SMTP id m8mr13962208obv.58.1431810454621; Sat, 16 May 2015 14:07:34 -0700 (PDT) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.202.104.196 with HTTP; Sat, 16 May 2015 14:06:54 -0700 (PDT) In-Reply-To: <1431786740.18913.0.camel@kuechenschabe> References: <001101d08fd8$cf5beb40$6e13c1c0$@php.net> <1431786740.18913.0.camel@kuechenschabe> Date: Sun, 17 May 2015 06:06:54 +0900 X-Google-Sender-Auth: R5BgYyVtsQLo14DNBMVFSsAq-lk Message-ID: To: =?UTF-8?Q?Johannes_Schl=C3=BCter?= Cc: Patrick Schaaf , francois , internals Content-Type: multipart/alternative; boundary=089e0158c2ea8896ec0516395952 Subject: Re: [PHP-DEV] Preload scripts and preloaded scripts only options From: yohgaki@ohgaki.net (Yasuo Ohgaki) --089e0158c2ea8896ec0516395952 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi Johannes, On Sat, May 16, 2015 at 11:32 PM, Johannes Schl=C3=BCter wrote: > That whitelist is called open_basedir. > http://php.net/manual/en/ini.core.php#ini.open-basedir > I'm trying to eliminate risks of script inclusion attack. open_basedir is not good enough to prevent include('/path/to/upload/attack_image_file.png'); Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --089e0158c2ea8896ec0516395952--