Plugging Security Holes with escapeshellcmd()
Before looking at escapeshellcmd(), let’s examine the danger it guards against. We want to allow users to type in the names of manual pages and view output online. Now that we can output one manual page, it is a trivial matter to output any available page. Do not install the code in Listing 21.5; we are deliberately leaving a major security gap unplugged.
Listing 21.5. Calling the man Command
1: <!DOCTYPE html PUBLIC 2: "-//W3C//DTD XHTML 1.0 Strict//EN" 3: "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> 4: <html> 5: <head> 6: <title>Listing 21.5 Calling the 'man' Command. 7: This Script is NOT Secure</title> 8: </head> 9: <body> 10: <div> 11: <form action="<?php print $PHP_SELF ?>" method="post"> ... |
Get Sams Teach Yourself PHP in 24 Hours, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.