This repository has been archived by the owner on Jul 14, 2023. It is now read-only.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR forbids the use of a considered non-secure function,
eval()
.Take the following PHP script as an example:
Using the following query string:
Displays the following in the browser:
A malicious user has more creative exploits than the example but it demonstrates the risk.
Information taken from OWASP, example taken from SE INFOSEC.
For a real example see: TRUESEC which exploits
unserialize()
(forbidden in PR 33), which, through a so called gadget chain gets to a class that makes use ofeval()
, resulting in the establishment of a reverse shell.With
eval()
added to the list of forbidden functions, the user would get the following error notification:The PHP documentation also reports a warning/caution about
eval()
in its documentation.