'Twas brillig, and Matthew Weier O'Phinney at 18/02/09 13:07 did gyre and gimble:
-- Colin Guthrie <[email protected]> wrote
(on Wednesday, 18 February 2009, 09:09 AM +0000):
'Twas brillig, and Wil Sinclair at 18/02/09 03:51 did gyre and gimble:
The Zend Framework team has been notified of a potential Local File Inclusion (LFI) attack vector in Zend_View's render() method. To address the issue, as of the 1.7.5 release the render() method no longer accepts paths that include parent directory traversal (e.g., "../" and "..\") in the path argument. This introduces a regression in behavior which can be addressed by turning off the lfiProtectionOn flag. For more information, see:

http://framework.zend.com/manual/en/zend.view.migration.html
Interesting.

Out of curiosity, does this only apply to the values passed in to render() or also to the script paths themselves? My base paths tend do have ../ in them (dirname(__FILE__).'/../views' or something similar). Obviously you'd hope the app knows best in this regard so I hope this is permissable.

Just the paths passed to render().

The original report was actually about the paths passed to
addScriptPath(), but the examples showed using user input to specify
those paths -- which is, quite simply, a really, really bad idea in the
first place. Additionally, it's not uncommon to use relative paths when
determining the view script paths, which would have made this a
difficult hole to close.

Excellent. This validates my thinking on the subject too which makes me feel I'm getting close to understanding all this jazz with some degree of accuracy ;)

Cheers again.


Col

/me now wonders why the three attempts to post a new message to this list have vaporised into the ether .... :(


--

Colin Guthrie
gmane(at)colin.guthr.ie
http://colin.guthr.ie/

Day Job:
  Tribalogic Limited [http://www.tribalogic.net/]
Open Source:
  Mandriva Linux Contributor [http://www.mandriva.com/]
  PulseAudio Hacker [http://www.pulseaudio.org/]
  Trac Hacker [http://trac.edgewall.org/]

Reply via email to