diff options
| author | jvoisin | 2018-01-12 12:09:52 +0100 |
|---|---|---|
| committer | jvoisin | 2018-01-12 12:09:52 +0100 |
| commit | 44255b8dbf5c98c8d110c2e3918298ee6978b93c (patch) | |
| tree | b588c6b3b87eb18b8fd1c0fa5e41856c6e6fe2fd /doc/source/features.rst | |
| parent | 5da0c0fa9351a758e28941a7d0b1755dd57fea9b (diff) | |
Massive overhaul of the documentation
Diffstat (limited to 'doc/source/features.rst')
| -rw-r--r-- | doc/source/features.rst | 19 |
1 files changed, 14 insertions, 5 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst index 86b81fd..24c5074 100644 --- a/doc/source/features.rst +++ b/doc/source/features.rst | |||
| @@ -61,6 +61,8 @@ Examples of related vulnerabilities | |||
| 61 | - `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer | 61 | - `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer |
| 62 | - `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube | 62 | - `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube |
| 63 | 63 | ||
| 64 | .. _cookie-encryption-feature: | ||
| 65 | |||
| 64 | Session-cookie stealing via XSS | 66 | Session-cookie stealing via XSS |
| 65 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 67 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 66 | 68 | ||
| @@ -82,6 +84,9 @@ thus using curve25519, xsalsa20 and poly1305 for the encryption. We chose this | |||
| 82 | library because of its portability, simplicity and reduced size (a single `.h` and | 84 | library because of its portability, simplicity and reduced size (a single `.h` and |
| 83 | `.c` file.). | 85 | `.c` file.). |
| 84 | 86 | ||
| 87 | |||
| 88 | .. _fileupload-feature: | ||
| 89 | |||
| 85 | Remote code execution via file-upload | 90 | Remote code execution via file-upload |
| 86 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 91 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 87 | 92 | ||
| @@ -114,6 +119,8 @@ Examples of related vulnerabilities | |||
| 114 | - `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM | 119 | - `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM |
| 115 | 120 | ||
| 116 | 121 | ||
| 122 | .. _unserialize-feature: | ||
| 123 | |||
| 117 | Unserialize-related magic | 124 | Unserialize-related magic |
| 118 | ^^^^^^^^^^^^^^^^^^^^^^^^^ | 125 | ^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 119 | 126 | ||
| @@ -191,11 +198,6 @@ It's worth noting that the PHP documentation contains the following warning: | |||
| 191 | 198 | ||
| 192 | This is of course addressed as well by the ``harden_rand`` feature. | 199 | This is of course addressed as well by the ``harden_rand`` feature. |
| 193 | 200 | ||
| 194 | .. warning:: | ||
| 195 | |||
| 196 | Activating this feature will raise an `Error <https://secure.php.net/manual/en/class.error.php>`_ | ||
| 197 | exception if ``min`` is superior to ``max``, while the default dehaviour is simply to swap them. | ||
| 198 | |||
| 199 | 201 | ||
| 200 | Examples of related vulnerabilities | 202 | Examples of related vulnerabilities |
| 201 | """"""""""""""""""""""""""""""""""" | 203 | """"""""""""""""""""""""""""""""""" |
| @@ -209,6 +211,8 @@ Examples of related vulnerabilities | |||
| 209 | - `CVE-2008-4102 <https://sektioneins.de/en/advisories/advisory-042008-joomla-weak-random-password-reset-token-vulnerability.html>`_: Unauthenticated accounts takeover in Joomla | 211 | - `CVE-2008-4102 <https://sektioneins.de/en/advisories/advisory-042008-joomla-weak-random-password-reset-token-vulnerability.html>`_: Unauthenticated accounts takeover in Joomla |
| 210 | - `CVE-2006-0632 <https://www.cvedetails.com/cve/CVE-2006-0632/>`_: Unauthenticated account takeover in phpBB | 212 | - `CVE-2006-0632 <https://www.cvedetails.com/cve/CVE-2006-0632/>`_: Unauthenticated account takeover in phpBB |
| 211 | 213 | ||
| 214 | .. _xxe-feature: | ||
| 215 | |||
| 212 | XXE | 216 | XXE |
| 213 | ^^^ | 217 | ^^^ |
| 214 | 218 | ||
| @@ -239,6 +243,8 @@ Examples of related vulnerabilities | |||
| 239 | - `CVE-2011-4107 <https://www.phpmyadmin.net/security/PMASA-2011-17/>`_: Authenticated local file disclosure in PHPMyAdmin | 243 | - `CVE-2011-4107 <https://www.phpmyadmin.net/security/PMASA-2011-17/>`_: Authenticated local file disclosure in PHPMyAdmin |
| 240 | 244 | ||
| 241 | 245 | ||
| 246 | .. _auto-cookie-secure-feature: | ||
| 247 | |||
| 242 | Cookie stealing via HTTP MITM | 248 | Cookie stealing via HTTP MITM |
| 243 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 249 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 244 | 250 | ||
| @@ -313,6 +319,8 @@ This feature is largely inspired from the | |||
| 313 | `autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__. | 319 | `autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__. |
| 314 | 320 | ||
| 315 | 321 | ||
| 322 | .. _readonly-exec-feature: | ||
| 323 | |||
| 316 | Preventing execution of writable PHP files | 324 | Preventing execution of writable PHP files |
| 317 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 325 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| 318 | 326 | ||
| @@ -337,6 +345,7 @@ it's broadly (mis)used all around the web. | |||
| 337 | Snuffleupagus provides a white and blacklist mechanism, to explicitly allow | 345 | Snuffleupagus provides a white and blacklist mechanism, to explicitly allow |
| 338 | and forbid specific functions call from being issued inside ``eval``. | 346 | and forbid specific functions call from being issued inside ``eval``. |
| 339 | 347 | ||
| 348 | .. _samesite-feature: | ||
| 340 | 349 | ||
| 341 | Protection against cross site request forgery | 350 | Protection against cross site request forgery |
| 342 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | 351 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
