diff options
| author | jvoisin | 2025-12-31 00:45:46 +0100 |
|---|---|---|
| committer | jvoisin | 2026-01-05 21:43:10 +0100 |
| commit | 9278dc77bab2a219e770a1b31dd6797bc9070e37 (patch) | |
| tree | f0f97d6d5bd8878997eafbe2a1493c3be5cc9e9d /scripts/upload_validation.py | |
| parent | e586b7df4e575d7d5e017b4134bdac9b297b667b (diff) | |
Fix possible arbitrary code execution on misconfigured deployments
When `upload_validation` is enabled, and when VLD isn't installed, an attacker
sending a multipart POST is able to get arbitrary PHP content executed.
Reported-By: thomas-chauchefoin-tob
Diffstat (limited to '')
| -rwxr-xr-x | scripts/upload_validation.py | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/scripts/upload_validation.py b/scripts/upload_validation.py index 1152804..e7ba195 100755 --- a/scripts/upload_validation.py +++ b/scripts/upload_validation.py | |||
| @@ -15,6 +15,7 @@ def check(filename): | |||
| 15 | "-d", "vld.col_sep=@", | 15 | "-d", "vld.col_sep=@", |
| 16 | "-d", "log_errors=0", | 16 | "-d", "log_errors=0", |
| 17 | "-d", "error_log=/dev/null", | 17 | "-d", "error_log=/dev/null", |
| 18 | "-l", | ||
| 18 | filename], | 19 | filename], |
| 19 | stderr=subprocess.STDOUT) | 20 | stderr=subprocess.STDOUT) |
| 20 | except subprocess.CalledProcessError as e: | 21 | except subprocess.CalledProcessError as e: |
