PHP Code
With the eval() function, PHP
allows a script to execute arbitrary PHP code. Although it can be useful
in a few limited cases, allowing any user-supplied data to go into an
eval() call is just begging to be
hacked. For instance, the following code is a security nightmare:
<html><head><title>Herearethekeys...</title></head><body><?phpif($_REQUEST['code']){echo"Executing code...";eval(stripslashes($_REQUEST['code']));// BAD!}?><form action="<?phpecho$_SERVER['PHP_SELF'];?>"><input type="text" name="code" /><input type="submit" name="Execute Code" /></form></body></html>
This page takes some arbitrary PHP code from a form and runs it as part of the script. The running code has access to all of the global variables for the script and runs with the same privileges as the script running the code. It’s not hard to see why this is a problem—type this into the form:
include("/etc/passwd");
Never do this. There is no practical way to ensure such a script can ever be secure.
You can globally disable particular function calls by listing
them, separated by commas, in the disable_functions configuration option in
php.ini. For example, you may never
have need for the system() function, so
you can disable it entirely with:
disable_functions = system
This doesn’t make eval() any
safer, though, as there’s no way to prevent important variables from being
changed or built-in constructs such as echo() being called.
Note that the preg_replace()
function with the /e option ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access