php-general Digest 22 Apr 2012 16:55:27 -0000 Issue 7784
Topics (messages 317641 through 317645):
Re: preg_replace_callback
317641 by: Stuart Dallas
317642 by: TR Shaw
317643 by: Igor Konforti
317644 by: TR Shaw
Blocking URL hacking attemps
317645 by: sono-io.fannullone.us
Administrivia:
To subscribe to the digest, e-mail:
php-general-digest-subscr...@lists.php.net
To unsubscribe from the digest, e-mail:
php-general-digest-unsubscr...@lists.php.net
To post to the list, e-mail:
php-gene...@lists.php.net
----------------------------------------------------------------------
--- Begin Message ---
On 20 Apr 2012, at 21:00, TR Shaw wrote:
> It appears that preg_replace_callback has a memory leak at least in version
> 5.3.8.
Based on what? If you have a repeatable test that demonstrates this behaviour
please create a bug report at https://bugs.php.net/ with all the details.
-Stuart
--
Stuart Dallas
3ft9 Ltd
http://3ft9.com/
--- End Message ---
--- Begin Message ---
On Apr 20, 2012, at 4:18 PM, Stuart Dallas wrote:
> On 20 Apr 2012, at 21:00, TR Shaw wrote:
>
>> It appears that preg_replace_callback has a memory leak at least in version
>> 5.3.8.
>
> Based on what? If you have a repeatable test that demonstrates this behaviour
> please create a bug report at https://bugs.php.net/ with all the details.
Thanks. Will do.
--- End Message ---
--- Begin Message ---
Please reply here with bug #number
:)
On Fri, Apr 20, 2012 at 23:21, TR Shaw <ts...@oitc.com> wrote:
>
> On Apr 20, 2012, at 4:18 PM, Stuart Dallas wrote:
>
> > On 20 Apr 2012, at 21:00, TR Shaw wrote:
> >
> >> It appears that preg_replace_callback has a memory leak at least in
> version 5.3.8.
> >
> > Based on what? If you have a repeatable test that demonstrates this
> behaviour please create a bug report at https://bugs.php.net/ with all
> the details.
>
> Thanks. Will do.
>
>
> --
> PHP General Mailing List (http://www.php.net/)
> To unsubscribe, visit: http://www.php.net/unsub.php
>
>
--- End Message ---
--- Begin Message ---
Bug #61792: preg_replace_callback memory leak
On Apr 20, 2012, at 4:43 PM, Igor Konforti wrote:
> Please reply here with bug #number
>
> :)
>
> On Fri, Apr 20, 2012 at 23:21, TR Shaw <ts...@oitc.com> wrote:
>
>>
>> On Apr 20, 2012, at 4:18 PM, Stuart Dallas wrote:
>>
>>> On 20 Apr 2012, at 21:00, TR Shaw wrote:
>>>
>>>> It appears that preg_replace_callback has a memory leak at least in
>> version 5.3.8.
>>>
>>> Based on what? If you have a repeatable test that demonstrates this
>> behaviour please create a bug report at https://bugs.php.net/ with all
>> the details.
>>
>> Thanks. Will do.
>>
>>
>> --
>> PHP General Mailing List (http://www.php.net/)
>> To unsubscribe, visit: http://www.php.net/unsub.php
>>
>>
--- End Message ---
--- Begin Message ---
I'm using a script called BlackHole that uses PHP and a "hidden"
directory to catch bad bots and block them by their IP address from the site
[http://perishablepress.com/blackhole-bad-bots/]. It's working very well, but
I'd like to expand on the idea.
When looking at our access logs, I see someone "adding code" to our
URL's in hopes to, apparently, hack into our site. If our URL is like this:
http://www.example.com/pages/bolts.php
they are adding to it like this:
http://www.example.com/pages/bolts.php/wp-content/themes/functions/thumb.php.cache/external_e19f4bb51bc2262e07d23b79b916c12c.php
or
http://www.example.com/pages/bolts.php/cart.php
or
http://www.example.com/pages/bolts.php/wp-content/themes/functions/thumb.phptimthumb.php
or
http://www.example.com/pages/bolts.php/bratislava/stare-mesto
Is there a way that I can trap the "extra" info in the URL's and pass
it to the BlackHole script to ban these attempts as well? I'm thinking I'll
need to compare the entered URL with $_SERVER["PHP_SELF"] and if there's extra
info, like another "*.php", after the page name, then ban the IP. I realize
that's a rather simplistic explanation and there may be a better way to
accomplish this.
If anyone has any examples they can share, I'd really appreciate.
Thanks,
Marc
--- End Message ---