December 2010
Intermediate to advanced
363 pages
12h 21m
English
We have continued our discussion of threats to your PHP application and your users' data by considering remote execution, an exploit where an attacker takes advantage of your application's openness to user-submitted input that is then executed by PHP.
After describing how remote execution works, and what dangers it presents, we provided six strategies for countering it:
eval() function with untrusted input.preg_replace() patterns with the e modifier.We then pointed out that, in attempting to prevent remote execution exploits, you need to balance ...