Edit report at https://bugs.php.net/bug.php?id=55181&edit=1

 ID:                 55181
 Patch added by:     f...@php.net
 Reported by:        f...@php.net
 Summary:            Enhance security by limiting the script extension
 Status:             Analyzed
 Type:               Feature/Change Request
 Package:            FPM related
 Operating System:   any
 PHP Version:        5.3.6
 Assigned To:        fat
 Block user comment: N
 Private report:     N

 New Comment:

The following patch has been added/updated:

Patch Name: fpm-extensions.v2.patch
Revision:   1310393984
URL:        
https://bugs.php.net/patch-display.php?bug=55181&patch=fpm-extensions.v2.patch&revision=1310393984


Previous Comments:
------------------------------------------------------------------------
[2011-07-11 08:36:13] f...@php.net

The following patch has been added/updated:

Patch Name: fpm-extensions.v1.patch
Revision:   1310387773
URL:        
https://bugs.php.net/patch-display.php?bug=55181&patch=fpm-extensions.v1.patch&revision=1310387773

------------------------------------------------------------------------
[2011-07-11 08:29:37] f...@php.net

Description:
------------
If the web server in front of FPM is misconfigured, FPM can parse and execute 
PHP 
code from any kind of files (test.php, test.txt, test.jpg, test.css, ...).

It should be possible to limit the extension of the primary script FPM will 
execute.

Something like (in pool configuration)
security.limit_extensions = .php

if the primary script does not end with .php, an access denied is returned 
(403).



------------------------------------------------------------------------



-- 
Edit this bug report at https://bugs.php.net/bug.php?id=55181&edit=1

Reply via email to