From 7418a0e1e9b02aef8535e33d30cfb8f082680f69 Mon Sep 17 00:00:00 2001 From: jvoisin Date: Sun, 1 Oct 2017 21:46:02 +0200 Subject: Fix some typos (courtesy of @sabban) and mention tests in the CONTRIBUTING.md file --- doc/source/config.rst | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'doc/source/config.rst') diff --git a/doc/source/config.rst b/doc/source/config.rst index 84fc193..25a6b73 100644 --- a/doc/source/config.rst +++ b/doc/source/config.rst @@ -38,7 +38,7 @@ global_strict ^^^^^^^^^^^^^ `default: disabled` -``global_strict`` will enable the `strict `_ mode globally, +``global_strict`` will enable the `strict `_ mode globally, forcing PHP to throw a `TypeError `_ exception if an argument type being passed to a function does not match its corresponding declared parameter type. @@ -53,7 +53,7 @@ harden_random ^^^^^^^^^^^^^ * `default: enabled` * `more `__ - + ``harden_random`` will silently replace the insecure `rand `_ and `mt_rand `_ functions with the secure PRNG `random_int `_. @@ -85,7 +85,7 @@ unserialize_hmac ^^^^^^^^^^^^^^^^ * `default: disabled` * `more `__ - + ``unserialize_hmac`` will add integrity check to ``unserialize`` calls, preventing abritrary code execution in their context. @@ -101,7 +101,7 @@ auto_cookie_secure ^^^^^^^^^^^^^^^^^^ * `default: disabled` * `more `__ - + ``auto_cookie_secure`` will automatically mark cookies as `secure `_ when the web page is requested over HTTPS. @@ -116,7 +116,7 @@ cookie_encryption ^^^^^^^^^^^^^^^^^ * `default: disabled` * `more `__ - + .. warning:: To use this feature, you **must** set the :ref:`global.secret_key ` variable. @@ -151,7 +151,7 @@ upload_validation * `default: disabled` * `more `__ -``upload_validation`` will call a given script upon a file upload, with the path +``upload_validation`` will call a given script upon a file upload, with the path to the file being uploaded as argument, and various information about it in the environment: * ``SP_FILENAME``: the name of the uploaded file @@ -192,8 +192,8 @@ Snuffleupagus provides virtual-patching, via the ``disable_functions`` directive Admitting you have a call to ``system()`` that lacks proper user-input validation, thus leading to an **RCE**, this might be the right tool. :: - - # Allow `id.php` to restrict system() calls to `id` + + # Restrict calls to `system` to `id` in the `id.php` file sp.disable_functions.function("system").filename("id.php").param("cmd").value("id").allow(); sp.disable_functions.function("system").filename("id.php").drop() -- cgit v1.3