On Thu, Mar 1, 2012 at 4:18 PM, John Crenshaw <johncrens...@priacta.com> wrote:
> No, you've misunderstood. The average new not-really-a-developer has no 
> concept of security. Every SQL query they write is vulnerable to injection. 
> Every echo exposes their site to XSS vulnerabilities. Every form is 
> vulnerable to CSRF. If they did anything with files in their script I may be 
> able to read arbitrary files to their server and/or upload and execute 
> arbitrary scripts. If they used eval() or system() I can probably execute 
> arbitrary shell code and take control of the entire site. If their server is 
> badly configured I could capture the entire machine.
>

PHP is as vulnerable as you make it,

> This isn't a question of keeping software updated and not using deprecated 
> functions, this is a question of discipline that is completely missing among 
> the "unwashed masses" as you call them. The intuitive way to handle many of 
> the most common PHP tasks is also the completely insecure way. 
> Philosophically, I wonder if we do a great disservice by encouraging these 
> people to tinker with code at all. We do so knowing (or at least we should 
> know) that anything they create will inevitably be hacked. We fuel the 
> widespread security problems that currently plague the web.
>
> John Crenshaw
> Priacta, Inc.

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to