<feed xmlns='http://www.w3.org/2005/Atom'>
<title>snuffleupagus/scripts/upload_validation.php, branch master</title>
<subtitle>Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest! 
</subtitle>
<id>http://git.dustri.org/snuffleupagus/atom?h=master</id>
<link rel='self' href='http://git.dustri.org/snuffleupagus/atom?h=master'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/'/>
<updated>2026-01-05T20:43:10Z</updated>
<entry>
<title>Fix possible arbitrary code execution on misconfigured deployments</title>
<updated>2026-01-05T20:43:10Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2025-12-30T23:45:46Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/commit/?id=9278dc77bab2a219e770a1b31dd6797bc9070e37'/>
<id>urn:sha1:9278dc77bab2a219e770a1b31dd6797bc9070e37</id>
<content type='text'>
When `upload_validation` is enabled, and when VLD isn't installed, an attacker
sending a multipart POST is able to get arbitrary PHP content executed.

Reported-By: thomas-chauchefoin-tob
</content>
</entry>
<entry>
<title>Provide a php script, to get rid of the python one for test suite</title>
<updated>2018-12-15T14:35:21Z</updated>
<author>
<name>Remi Collet</name>
</author>
<published>2018-12-15T14:35:21Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/commit/?id=19fcea2853bd95195b1c43e119ad8d870d82e587'/>
<id>urn:sha1:19fcea2853bd95195b1c43e119ad8d870d82e587</id>
<content type='text'>
This commit adds a php version of the upload_validation.py script.</content>
</entry>
</feed>
