From 3b113be573cdbca20ce9ec9c0a6efb25ccf51db5 Mon Sep 17 00:00:00 2001 From: jvoisin Date: Thu, 4 Jan 2018 15:59:59 +0100 Subject: Eval blacklist Add support for eval filtering, only blacklist for now--- src/sp_execute.c | 3 +++ 1 file changed, 3 insertions(+) (limited to 'src/sp_execute.c') diff --git a/src/sp_execute.c b/src/sp_execute.c index 7dd0798..a50bfd5 100644 --- a/src/sp_execute.c +++ b/src/sp_execute.c @@ -68,6 +68,7 @@ static void sp_execute_ex(zend_execute_data *execute_data) { } if (execute_data->func->op_array.type == ZEND_EVAL_CODE) { + SNUFFLEUPAGUS_G(in_eval) = true; sp_list_node *config = SNUFFLEUPAGUS_G(config).config_disabled_constructs->construct_eval; char *filename = get_eval_filename((char *)zend_get_executed_filename()); @@ -86,6 +87,8 @@ static void sp_execute_ex(zend_execute_data *execute_data) { if (true == should_drop_on_ret(execute_data->return_value, execute_data)) { sp_terminate(); } + + SNUFFLEUPAGUS_G(in_eval) = false; } static int sp_stream_open(const char *filename, zend_file_handle *handle) { -- cgit v1.3