Moved null byte security information into data filtering.

This commit is contained in:
Jamie York
2012-07-12 13:04:00 -06:00
parent f59f236333
commit d39b4c8448
2 changed files with 3 additions and 19 deletions

View File

@@ -27,12 +27,13 @@ Another example is passing options to be executed on the command line. This can
command's arguments.
One last example is accepting foreign input to determine a file to load from the filesystem. This can be exploited by
changing the filename to a file path. You need to remove "/", "../", or other characters from the file path so it can't
changing the filename to a file path. You need to remove "/", "../", [null bytes][6], or other characters from the file path so it can't
load hidden, non-public, or sensitive files.
* [Learn about data filtering][1]
* [Learn about `filter_var`][4]
* [Learn about `filter_input`][5]
* [Learn about handling null bytes][6]
### Sanitization
@@ -61,4 +62,5 @@ email address, a phone number, or age when processing a registration submission.
[3]: http://www.php.net/manual/en/filter.filters.validate.php
[4]: http://php.net/manual/en/function.filter-var.php
[5]: http://www.php.net/manual/en/function.filter-input.php
[6]: http://php.net/manual/en/security.filesystem.nullbytes.php
[html-purifier]: http://htmlpurifier.org/

View File

@@ -1,18 +0,0 @@
---
isChild: true
---
## Null Bytes
A null byte `\0` denotes the end of a string in [C](http://en.wikipedia.org/wiki/C_(programming_language)). As PHP uses C for all it's
filesystem related operations it means a filesystem path could be [null byte poisoned][2].
To prevent this it is important to remove any null bytes from filesystem paths, _especially_ if they come from user input:
$filepath = str_replace(chr(0), '', $_FILE['tmp_name']);
[See Null Byte Related Issues][1]
[See Null Byte Poisoning][2]
[1]: http://php.net/manual/en/security.filesystem.nullbytes.php
[2]: http://www.madirish.net/?article=436