> Could a malicious user
> use such a feature to perform a DOS attack by hitting a file that is
> known to be large (logs etc.)? Two requests a minute could tie up one
> core.

I've tested a bit more and finding this behaviour on both BSD and Ubuntu
under Apache 2.2 /PHP 5.2

As a quick fix if this is confirmed, can I suggest adding a
RewriteCond to shindig/php/.htaccess:

RewriteCond %{QUERY_STRING} !(.*?file\:\/.*?)


Tim

Reply via email to