summaryrefslogtreecommitdiff
path: root/doc/source/features.rst
diff options
context:
space:
mode:
authorjvoisin2018-01-12 12:09:52 +0100
committerjvoisin2018-01-12 12:09:52 +0100
commit44255b8dbf5c98c8d110c2e3918298ee6978b93c (patch)
treeb588c6b3b87eb18b8fd1c0fa5e41856c6e6fe2fd /doc/source/features.rst
parent5da0c0fa9351a758e28941a7d0b1755dd57fea9b (diff)
Massive overhaul of the documentation
Diffstat (limited to 'doc/source/features.rst')
-rw-r--r--doc/source/features.rst19
1 files changed, 14 insertions, 5 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst
index 86b81fd..24c5074 100644
--- a/doc/source/features.rst
+++ b/doc/source/features.rst
@@ -61,6 +61,8 @@ Examples of related vulnerabilities
61- `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer 61- `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer
62- `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube 62- `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube
63 63
64.. _cookie-encryption-feature:
65
64Session-cookie stealing via XSS 66Session-cookie stealing via XSS
65^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 67^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
66 68
@@ -82,6 +84,9 @@ thus using curve25519, xsalsa20 and poly1305 for the encryption. We chose this
82library because of its portability, simplicity and reduced size (a single `.h` and 84library because of its portability, simplicity and reduced size (a single `.h` and
83`.c` file.). 85`.c` file.).
84 86
87
88.. _fileupload-feature:
89
85Remote code execution via file-upload 90Remote code execution via file-upload
86^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 91^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
87 92
@@ -114,6 +119,8 @@ Examples of related vulnerabilities
114- `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM 119- `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM
115 120
116 121
122.. _unserialize-feature:
123
117Unserialize-related magic 124Unserialize-related magic
118^^^^^^^^^^^^^^^^^^^^^^^^^ 125^^^^^^^^^^^^^^^^^^^^^^^^^
119 126
@@ -191,11 +198,6 @@ It's worth noting that the PHP documentation contains the following warning:
191 198
192This is of course addressed as well by the ``harden_rand`` feature. 199This is of course addressed as well by the ``harden_rand`` feature.
193 200
194.. warning::
195
196 Activating this feature will raise an `Error <https://secure.php.net/manual/en/class.error.php>`_
197 exception if ``min`` is superior to ``max``, while the default dehaviour is simply to swap them.
198
199 201
200Examples of related vulnerabilities 202Examples of related vulnerabilities
201""""""""""""""""""""""""""""""""""" 203"""""""""""""""""""""""""""""""""""
@@ -209,6 +211,8 @@ Examples of related vulnerabilities
209- `CVE-2008-4102 <https://sektioneins.de/en/advisories/advisory-042008-joomla-weak-random-password-reset-token-vulnerability.html>`_: Unauthenticated accounts takeover in Joomla 211- `CVE-2008-4102 <https://sektioneins.de/en/advisories/advisory-042008-joomla-weak-random-password-reset-token-vulnerability.html>`_: Unauthenticated accounts takeover in Joomla
210- `CVE-2006-0632 <https://www.cvedetails.com/cve/CVE-2006-0632/>`_: Unauthenticated account takeover in phpBB 212- `CVE-2006-0632 <https://www.cvedetails.com/cve/CVE-2006-0632/>`_: Unauthenticated account takeover in phpBB
211 213
214.. _xxe-feature:
215
212XXE 216XXE
213^^^ 217^^^
214 218
@@ -239,6 +243,8 @@ Examples of related vulnerabilities
239- `CVE-2011-4107 <https://www.phpmyadmin.net/security/PMASA-2011-17/>`_: Authenticated local file disclosure in PHPMyAdmin 243- `CVE-2011-4107 <https://www.phpmyadmin.net/security/PMASA-2011-17/>`_: Authenticated local file disclosure in PHPMyAdmin
240 244
241 245
246.. _auto-cookie-secure-feature:
247
242Cookie stealing via HTTP MITM 248Cookie stealing via HTTP MITM
243^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 249^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
244 250
@@ -313,6 +319,8 @@ This feature is largely inspired from the
313`autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__. 319`autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__.
314 320
315 321
322.. _readonly-exec-feature:
323
316Preventing execution of writable PHP files 324Preventing execution of writable PHP files
317^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 325^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
318 326
@@ -337,6 +345,7 @@ it's broadly (mis)used all around the web.
337Snuffleupagus provides a white and blacklist mechanism, to explicitly allow 345Snuffleupagus provides a white and blacklist mechanism, to explicitly allow
338and forbid specific functions call from being issued inside ``eval``. 346and forbid specific functions call from being issued inside ``eval``.
339 347
348.. _samesite-feature:
340 349
341Protection against cross site request forgery 350Protection against cross site request forgery
342^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 351^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^