> On Nov 26, 2019, at 11:27 AM, Ian Littman <ians...@gmail.com> wrote:
> 
> You're right that turning off eval() isn't a silver bullet, and if you can
> get external code running on someone's box there are a lot worse things you
> can do.
> 
> On Tue, Nov 26, 2019 at 10:11 AM Benjamin Morel <benjamin.mo...@gmail.com>
> wrote:
> 
>> Hi Ian,
>> 
>> IMO, eval() is secure, as long as:
>> 
>> - you’re not using it, or
>> - you’re using it properly
>> 
>> I’d say that as soon as your server has been compromised, eval() is the
>> last of your worries, as pretty much anything becomes possible, including
>> writing PHP code to a file and including/executing it. So I feel like
>> disabling eval() will just make « hackers » have a good laugh


There might be a good argument for turning it eval() and create_function() off 
by default for command-line use?

#jmtcw

-Mike

Reply via email to