Full Disclosure mailing list archives
Re: Security Advisory - phpBB 2.0.15 PHP-code injection bug
From: Tatercrispies <tatercrispies () gmail com>
Date: Wed, 29 Jun 2005 08:41:41 -0500
Why is this ability even present in PHP's regular expression functions? What kind of decision making concludes that regular expression functions should be able to execute inline code? I just can't get my head around this. Are there any other PHP functions that bizarrely mate EVAL ability with seemingly unrelated functions?
The highlighting code uses the preg_replace() function on line 1110 in viewtopic.php. It uses the special modifier "e" which causes PHP to evaluate the replacement string as PHP code. Below is a PHP code example of what actually happens:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Security Advisory - phpBB 2.0.15 PHP-code injection bug ronvdaal (Jun 28)
- Re: Security Advisory - phpBB 2.0.15 PHP-code injection bug Andrew Farmer (Jun 29)
- Re: Security Advisory - phpBB 2.0.15 PHP-code injection bug Tatercrispies (Jun 29)
- <Possible follow-ups>
- Re: Security Advisory - phpBB 2.0.15 PHP-code injection bug Siegfried (Jun 29)