<feed xmlns='http://www.w3.org/2005/Atom'>
<title>snuffleupagus/scripts/upload_validation.py, branch master</title>
<subtitle>Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest! 
</subtitle>
<id>http://git.dustri.org/snuffleupagus/atom?h=master</id>
<link rel='self' href='http://git.dustri.org/snuffleupagus/atom?h=master'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/'/>
<updated>2026-01-05T20:43:10Z</updated>
<entry>
<title>Fix possible arbitrary code execution on misconfigured deployments</title>
<updated>2026-01-05T20:43:10Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2025-12-30T23:45:46Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/commit/?id=9278dc77bab2a219e770a1b31dd6797bc9070e37'/>
<id>urn:sha1:9278dc77bab2a219e770a1b31dd6797bc9070e37</id>
<content type='text'>
When `upload_validation` is enabled, and when VLD isn't installed, an attacker
sending a multipart POST is able to get arbitrary PHP content executed.

Reported-By: thomas-chauchefoin-tob
</content>
</entry>
<entry>
<title>php-nightly is now allowed to fail</title>
<updated>2018-02-22T15:35:39Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2018-02-22T15:35:39Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/commit/?id=884bbbdf5f0916a840bb9fc8f40c14163d58fad8'/>
<id>urn:sha1:884bbbdf5f0916a840bb9fc8f40c14163d58fad8</id>
<content type='text'>
PHP is breaking too many things on nightly, we'll only support releases from now on.

This should also make our vld-based file-upload checker more resilient: no more random warnings on stderr.</content>
</entry>
<entry>
<title>Provide a script for upload validation</title>
<updated>2018-02-12T12:55:33Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2018-02-12T12:55:33Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/snuffleupagus/commit/?id=696ebc4ae68f4c7c2b803c917de365b98621b3a8'/>
<id>urn:sha1:696ebc4ae68f4c7c2b803c917de365b98621b3a8</id>
<content type='text'>
The Python script is using vld (https://derickrethans.nl/projects.html#vld) to check for malicious opcodes.</content>
</entry>
</feed>
