PHP is not, in my opinion, idiot-proof. You're right on that point. Where our opinions differ is about what should be done about this.
If a programmer is not capable of controlling an user input, why then should we trust him with anything ? A lot of other functions taking user input as arguments could potentially be as damaging as this one. I think if a programmer can't read a manual page about a so common function, he deserves what he has. Yes, I'm feeling a bit pre-conventionnal tonight. As for the `rm -rf /` case, I think it's the best exemple. Why should a hacker bother on exploiting an include stupidly called with user input unfiltered when he can get straight to an unprotected system($_GET['Whatever']). Are you suggesting that virtually _any_ function should be protected against stupidity ? What kind of language PHP would be after that ? On 6/29/05, Russell Nelson <[EMAIL PROTECTED]> wrote: > Gareth Ardron writes: > > To me, it's obvious that include includes a file - I see no obvious > > determination that that file is either local or remote in the "include" > > statement. > > Can you name some other languages in which 'include' has such > incredibly sharp edges? C? Python? Perl? BASH? Sed? Awk? Pascal? > BASIC? Is there *any* precedent for a language in which 'include' > will fetch hostile code from a remote server and execute it? If > you're going to argue that experienced programmers will understand > that 'include' will fetch code, you should explain how their > experience helps them. > > > Also, I think it's silly to make include into two functions as you > > suggest given that the ability to include a remote file depends on the > > fopen wrapper being enabled. If we were to follow this line of logic, we > > would have two functions for every current one function which can use > > the fopen wrappers. > > That's not my line of logic, so following it takes you off the map. > > > I think the documentation quite clearly states that /all/ functions that > > deal with files may deal with remote files if the fopen wrappers are > > enabled > > Why did both of my users miss that documentation? The facts seem to > be in opposition to your assertion that "the documentation quite > clearly states". > > > However, as I mention above, every single function that can use > > fopen wrappers can be exploited in this way. > > Not true. You would need to have *another* security flaw (a bug in > jpg or xml parsing) for hostile jpg or xml content to gain privileges. > > > It's unfortunate, but there's a lot of muppets out there who think > > they can code > > Now you're blaming the victim. > > -- > --My blog is at blog.russnelson.com | If you want to find > Crynwr sells support for free software | PGPok | injustice in economic > 521 Pleasant Valley Rd. | +1 315-323-1241 | affairs, look for the > Potsdam, NY 13676-3213 | | hand of a legislator. > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > -- Nicolas Bérard Nault ([EMAIL PROTECTED]) "Maybe nature is fundamentally ugly, chaotic and complicated. But if it's like that, then I want out." -- Steven Weinberg (prix Nobel de physique, 1979). -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php