iliaa Wed Sep 19 22:37:59 2007 UTC Modified files: (Branch: PHP_5_2) /php-src/ext/standard dir.c /php-src NEWS Log: Fixed regression in glob() when enforcing safe_mode/open_basedir checks on paths containing '*' http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.147.2.3.2.11&r2=1.147.2.3.2.12&diff_format=u Index: php-src/ext/standard/dir.c diff -u php-src/ext/standard/dir.c:1.147.2.3.2.11 php-src/ext/standard/dir.c:1.147.2.3.2.12 --- php-src/ext/standard/dir.c:1.147.2.3.2.11 Tue Sep 4 12:51:49 2007 +++ php-src/ext/standard/dir.c Wed Sep 19 22:37:58 2007 @@ -16,7 +16,7 @@ +----------------------------------------------------------------------+ */ -/* $Id: dir.c,v 1.147.2.3.2.11 2007/09/04 12:51:49 iliaa Exp $ */ +/* $Id: dir.c,v 1.147.2.3.2.12 2007/09/19 22:37:58 iliaa Exp $ */ /* {{{ includes/startup/misc */ @@ -396,6 +396,7 @@ glob_t globbuf; int n; int ret; + zend_bool basedir_limit = 0; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|l", &pattern, &pattern_len, &flags) == FAILURE) { return; @@ -429,22 +430,7 @@ } #endif - if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) { - int pattern_len = strlen(pattern); - char *basename = estrndup(pattern, pattern_len); - - php_dirname(basename, pattern_len); - if (PG(safe_mode) && (!php_checkuid(basename, NULL, CHECKUID_CHECK_FILE_AND_DIR))) { - efree(basename); - RETURN_FALSE; - } - if (php_check_open_basedir(basename TSRMLS_CC)) { - efree(basename); - RETURN_FALSE; - } - efree(basename); - } - + memset(&globbuf, 0, sizeof(glob_t)); globbuf.gl_offs = 0; if (0 != (ret = glob(pattern, flags & GLOB_FLAGMASK, NULL, &globbuf))) { @@ -458,8 +444,7 @@ can be used for simple glob() calls without further error checking. */ - array_init(return_value); - return; + goto no_results; } #endif RETURN_FALSE; @@ -467,12 +452,29 @@ /* now catch the FreeBSD style of "no matches" */ if (!globbuf.gl_pathc || !globbuf.gl_pathv) { +no_results: + if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) { + struct stat s; + + if (0 != VCWD_STAT(pattern, &s) || S_IFDIR != (s.st_mode & S_IFMT)) { + RETURN_FALSE; + } + } array_init(return_value); return; } array_init(return_value); for (n = 0; n < globbuf.gl_pathc; n++) { + if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) { + if (PG(safe_mode) && (!php_checkuid(globbuf.gl_pathv[n], NULL, CHECKUID_CHECK_FILE_AND_DIR))) { + basedir_limit = 1; + continue; + } else if (php_check_open_basedir_ex(globbuf.gl_pathv[n], 0 TSRMLS_CC)) { + basedir_limit = 1; + continue; + } + } /* we need to do this everytime since GLOB_ONLYDIR does not guarantee that * all directories will be filtered. GNU libc documentation states the * following: @@ -496,6 +498,11 @@ } globfree(&globbuf); + + if (basedir_limit && !zend_hash_num_elements(Z_ARRVAL_P(return_value))) { + zval_dtor(return_value); + RETURN_FALSE; + } } /* }}} */ #endif http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.956&r2=1.2027.2.547.2.957&diff_format=u Index: php-src/NEWS diff -u php-src/NEWS:1.2027.2.547.2.956 php-src/NEWS:1.2027.2.547.2.957 --- php-src/NEWS:1.2027.2.547.2.956 Wed Sep 19 00:41:10 2007 +++ php-src/NEWS Wed Sep 19 22:37:58 2007 @@ -5,6 +5,8 @@ - Added optional parameter $provide_object to debug_backtrace(). (Sebastian) - Added alpha support for imagefilter() IMG_FILTER_COLORIZE. (Pierre) +- Fixed regression in glob() when enforcing safe_mode/open_basedir checks on + paths containing '*'. (Ilia) - Fixed "mail.force_extra_parameters" php.ini directive not to be modifiable in .htaccess due to the security implications - reported by SecurityReason. (Stas)
-- PHP CVS Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php