iliaa Wed Sep 19 22:37:59 2007 UTC
Modified files: (Branch: PHP_5_2)
/php-src/ext/standard dir.c
/php-src NEWS
Log:
Fixed regression in glob() when enforcing safe_mode/open_basedir checks on
paths containing '*'
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.147.2.3.2.11&r2=1.147.2.3.2.12&diff_format=u
Index: php-src/ext/standard/dir.c
diff -u php-src/ext/standard/dir.c:1.147.2.3.2.11
php-src/ext/standard/dir.c:1.147.2.3.2.12
--- php-src/ext/standard/dir.c:1.147.2.3.2.11 Tue Sep 4 12:51:49 2007
+++ php-src/ext/standard/dir.c Wed Sep 19 22:37:58 2007
@@ -16,7 +16,7 @@
+----------------------------------------------------------------------+
*/
-/* $Id: dir.c,v 1.147.2.3.2.11 2007/09/04 12:51:49 iliaa Exp $ */
+/* $Id: dir.c,v 1.147.2.3.2.12 2007/09/19 22:37:58 iliaa Exp $ */
/* {{{ includes/startup/misc */
@@ -396,6 +396,7 @@
glob_t globbuf;
int n;
int ret;
+ zend_bool basedir_limit = 0;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|l", &pattern,
&pattern_len, &flags) == FAILURE) {
return;
@@ -429,22 +430,7 @@
}
#endif
- if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) {
- int pattern_len = strlen(pattern);
- char *basename = estrndup(pattern, pattern_len);
-
- php_dirname(basename, pattern_len);
- if (PG(safe_mode) && (!php_checkuid(basename, NULL,
CHECKUID_CHECK_FILE_AND_DIR))) {
- efree(basename);
- RETURN_FALSE;
- }
- if (php_check_open_basedir(basename TSRMLS_CC)) {
- efree(basename);
- RETURN_FALSE;
- }
- efree(basename);
- }
-
+
memset(&globbuf, 0, sizeof(glob_t));
globbuf.gl_offs = 0;
if (0 != (ret = glob(pattern, flags & GLOB_FLAGMASK, NULL, &globbuf))) {
@@ -458,8 +444,7 @@
can be used for simple glob() calls without further
error
checking.
*/
- array_init(return_value);
- return;
+ goto no_results;
}
#endif
RETURN_FALSE;
@@ -467,12 +452,29 @@
/* now catch the FreeBSD style of "no matches" */
if (!globbuf.gl_pathc || !globbuf.gl_pathv) {
+no_results:
+ if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) {
+ struct stat s;
+
+ if (0 != VCWD_STAT(pattern, &s) || S_IFDIR !=
(s.st_mode & S_IFMT)) {
+ RETURN_FALSE;
+ }
+ }
array_init(return_value);
return;
}
array_init(return_value);
for (n = 0; n < globbuf.gl_pathc; n++) {
+ if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) {
+ if (PG(safe_mode) &&
(!php_checkuid(globbuf.gl_pathv[n], NULL, CHECKUID_CHECK_FILE_AND_DIR))) {
+ basedir_limit = 1;
+ continue;
+ } else if
(php_check_open_basedir_ex(globbuf.gl_pathv[n], 0 TSRMLS_CC)) {
+ basedir_limit = 1;
+ continue;
+ }
+ }
/* we need to do this everytime since GLOB_ONLYDIR does not
guarantee that
* all directories will be filtered. GNU libc documentation
states the
* following:
@@ -496,6 +498,11 @@
}
globfree(&globbuf);
+
+ if (basedir_limit && !zend_hash_num_elements(Z_ARRVAL_P(return_value)))
{
+ zval_dtor(return_value);
+ RETURN_FALSE;
+ }
}
/* }}} */
#endif
http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.956&r2=1.2027.2.547.2.957&diff_format=u
Index: php-src/NEWS
diff -u php-src/NEWS:1.2027.2.547.2.956 php-src/NEWS:1.2027.2.547.2.957
--- php-src/NEWS:1.2027.2.547.2.956 Wed Sep 19 00:41:10 2007
+++ php-src/NEWS Wed Sep 19 22:37:58 2007
@@ -5,6 +5,8 @@
- Added optional parameter $provide_object to debug_backtrace(). (Sebastian)
- Added alpha support for imagefilter() IMG_FILTER_COLORIZE. (Pierre)
+- Fixed regression in glob() when enforcing safe_mode/open_basedir checks on
+ paths containing '*'. (Ilia)
- Fixed "mail.force_extra_parameters" php.ini directive not to be modifiable
in .htaccess due to the security implications - reported by SecurityReason.
(Stas)
--
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php