From c463edcee51dfab4358f1aff5a70c2f2f940a20b Mon Sep 17 00:00:00 2001 From: jvoisin Date: Fri, 5 Jan 2018 11:07:15 +0100 Subject: Fix a bypass in our eval blacklist --- src/sp_disabled_functions.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'src/sp_disabled_functions.c') diff --git a/src/sp_disabled_functions.c b/src/sp_disabled_functions.c index 45b8954..d59dd93 100644 --- a/src/sp_disabled_functions.c +++ b/src/sp_disabled_functions.c @@ -464,7 +464,7 @@ ZEND_FUNCTION(eval_filter_callback) { void (*orig_handler)(INTERNAL_FUNCTION_PARAMETERS); const char* current_function_name = get_active_function_name(TSRMLS_C); - if (SNUFFLEUPAGUS_G(in_eval) == true) { + if (SNUFFLEUPAGUS_G(in_eval) > 0) { const char* filename = get_eval_filename(zend_get_executed_filename()); const int line_number = zend_get_executed_lineno(TSRMLS_C); if (1 == SNUFFLEUPAGUS_G(config).config_eval->simulation) { -- cgit v1.3