[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] flaw in php_exec_dir patch



hi venom, 

which patch are u talking .. 
well did u ever try 

http://www.google.com/search?q=php_exec_dir+site:www.php.net&l=en

there are quite a few entry which tells nothing except similar to ur post
well give a try in php-internals archive. u just get nothing. actually which 
patch are u talking about. it was never issued officially and was not  around
in the communities. you are talking about some unkown directives that was 
never intend to be used.  people often make a use of apache directives to 
allow non-safe mode to their trusted scripts, that is what i see a good 
solution for the time being. anyway if its a cool patch i am interested! give 
me some references. 

> heres a hint, learn about the product b4 you spam a mailing list, i see 5
> posts from you asking the exact same question 2 hrs apart from each other

well i never posted and saw it in the list u might be wrong. 
actually there were some postings about this patches existence. did u check 
that.

On Saturday 26 June 2004 07:19 am, VeNoMouS wrote:
> Dude do you even know what php_exec_dir patch is, its a patch so you dont
> have to turn safe mode on, which disables a bunch of shit that you need, so
> the patch was a work around simply stop you executing programs.
>
> heres a hint, learn about the product b4 you spam a mailing list, i see 5
> posts from you asking the exact same question 2 hrs apart from each other
> you think you could've googled in that time or perhaps fixed your mail
> queue?
>
> either or, stop being so fucking lazy.
>
>
> ----- Original Message -----
> From: "npguy" <npguy@xxxxxxxxxxxxxxxx>
> To: "VeNoMouS" <venom@xxxxxxxxxxx>; <full-disclosure@xxxxxxxxxxxxxxxx>
> Sent: Friday, June 25, 2004 2:47 AM
> Subject: Re: [Full-Disclosure] flaw in php_exec_dir patch
>
> > is your safe mode on? .. whats ur platorm.
> > give more details!
> >
> > On Wednesday 23 June 2004 07:05 am, VeNoMouS wrote:
> >> Found a issue last night while testing php_exec_dir patch
> >>
> >> if you do the following
> >>
> >> $blah=`ps aux`;
> >> echo nl2br($blah);
> >>
> >> php_exec_dir will block the call if you have set the exec_dir parm in
> >> php or apache
> >>
> >> anyway.... if you do this
> >>
> >> $blah=`;ps aux`;
> >> echo nl2br($blah);
> >>
> >> it bypasses the exec block and excutes the ps due to the ';', as bash
> >> interrupts ';' as a new cmd, ive emailed the author but no response.
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html