ID:               14909
 Updated by:       [EMAIL PROTECTED]
 Reported By:      [EMAIL PROTECTED]
-Status:           Open
+Status:           Closed
 Bug Type:         Apache related
 Operating System: Windows
 PHP Version:      4.1.1
 Assigned To:      imajes
 New Comment:

we have a manual chapter for securing the cgi-bin installation.
http://www.php.net/manual/en/security.cgi-bin.php


Previous Comments:
------------------------------------------------------------------------

[2002-02-24 03:56:30] [EMAIL PROTECTED]

For emmergency, a simple check at "auto_prepend_file"  whould help:

<?PHP
if (preg_match("/^\/php\/php.exe/i",$_SERVER["REQUEST_URI"])) {
print "No Hack"; exit;
}
?>

------------------------------------------------------------------------

[2002-01-09 09:56:39] [EMAIL PROTECTED]

I have windows xp + apache + php 4.1 installed and the /php/ alias is
also definied in my httpd.conf and therefor I am also affected by this
exploit. but how can I use php WITHOUT this alias in apache conf? I
tried several things but it doesn't work.

chris, 15 =)

------------------------------------------------------------------------

[2002-01-09 02:17:17] [EMAIL PROTECTED]

so do we have to read the documentation again on how to install PHP??
have u added a fix?

------------------------------------------------------------------------

[2002-01-08 08:03:10] [EMAIL PROTECTED]

the documentation is fixed, i committed this morning/last night.

there is however a bug in the way apache handles the binary -- or the
way php acts when called as a binary (you can get premature end of
script headers).

What i would like to do is leave this open, and noticeable for some of
the apache guys to take a look at and comment on it. 

The docs are fixed.... we just need to wait to see if this is a thing
to hand off to apache.

------------------------------------------------------------------------

[2002-01-08 07:16:40] [EMAIL PROTECTED]

As said by others, this is NOT a bug, but a documentation problem.
(btw: assigned to only needs your username)

------------------------------------------------------------------------

The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
    http://bugs.php.net/14909

-- 
Edit this bug report at http://bugs.php.net/?id=14909&edit=1

Reply via email to