blob: f2afdf73ee735c79d0ab9460f5e757eebdd8f66b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
|
--TEST--
suhosin SERVER filter
--INI--
suhosin.log.syslog=0
suhosin.log.sapi=0
suhosin.log.script=0
suhosin.log.file=255
suhosin.log.file.time=0
suhosin.log.file.name={PWD}/suhosintest.$$.log.tmp
auto_append_file={PWD}/suhosintest.$$.log.tmp
--SKIPIF--
<?php include('../skipif.inc'); ?>
--ENV--
return <<<END
HTTP_POST_VARS=HTTP_POST_VARS
HTTP_MY_VARS=HTTP_MY_VARS
HTTP_GET_VARS=HTTP_GET_VARS
HTTP_ENV_VARS=HTTP_ENV_VARS
HTTP_SERVER_VARS=HTTP_SERVER_VARS
HTTP_SESSION_VARS=HTTP_SESSION_VARS
HTTP_COOKIE_VARS=HTTP_COOKIE_VARS
HTTP_RAW_POST_DATA=HTTP_RAW_POST_DATA
HTTP_POST_FILES=HTTP_POST_FILES
END;
--COOKIE--
--GET--
--POST--
--FILE--
<?php
foreach ($_SERVER as $k => $v) {
if (!strncmp($k, "HTTP_", 5)) echo "$k => $v\n";
}
?>
--EXPECTF--
HTTP_MY_VARS => HTTP_MY_VARS
ALERT - Attacker tried to overwrite a superglobal through a HTTP header (attacker 'REMOTE_ADDR not set', file '%s')
|