Ò׽ؽØͼÈí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

Month of PHP Security Summary

it is 21th of May. The Month of PHP Security
(http://www.php-security.org) is still running and we have reached a
vulnerability count of 40 vulnerabilities, which is nearly as much as we
disclosed during the whole Month of PHP Bugs in 2007. However there are
11 more days until the end of May and therefore there are still plenty
of more vulnerabilities to come. Escpecially the amount of SQL injection
vulnerabilites in PHP applications will increase, because it is called
SQL injection marathon for a reason. And we also have several articles
and submissions left.
There have been some changes to the website that should make it easier
to read and we also added the possiblity to comment on bugs/entries/news
and articles.
For those that don't already know you can follow the Month of PHP
Security on Twitter, too. Just follow @mops_2010
Here is the summary of what happened during the last 10 days.
Related Events
--------------
Returning into the PHP Interpreter – Remote Exploitation of Memory
Corruptions in PHP is not over, yet.
http://php-security.org/2010/05/21/related-event-returning-into-the-php-interpreter-remote-exploitation-of-memory-corruptions-in-php-is-not-over-yet/
PHP Security Course – Advanced PHP Auditing at Source and Bytecode level
http://php-security.org/2010/05/19/related-event-php-security-course-advanced-php-auditing-at-source-and-bytecode-level/
Articles
--------
MOPS Submission 07: Our Dynamic PHP – Obvious and not so obvious PHP
code injection and evaluation
http://php-security.org/2010/05/20/mops-submission-07-our-dynamic-php/
MOPS Submission 06: Variable Initialization in PHP
http://php-security.org/2010/05/17/mops-submission-06-variable-initialization-in-php/
Article: Decoding a User Space Encoded PHP Script
http://php-security.org/2010/05/13/article-decoding-a-user-space-encoded-php-script/
MOPS Submission 05 – The Minerva PHP Fuzzer
http://php-security.org/2010/05/11/mops-submission-05-the-mi


Ïà¹ØÎĵµ£º

PHPÓÃÓʼþÈ¡»ØÍü¼ÇÃÜÂ빦ÄÜ£¿

wangjimima.php
<form id="form1" name="form1" method="post" action="mailto.php" onSubmit="return CheckForm()">
<input name="username" type="text" class="in" id="username" size="30" onmouseover="fEvent('mouseover',this)" onfocus="fEvent('focus',this)" onblur="fEvent('blur',this)" onmouseout ......

phpÄ£°å¼¼Êõ

Õ¾µã½á¹¹

´úÂë:
Õ¾µã
  ©»includes
       ©»class.inc
  ©Çtemplet
       ©»index.htm
       ©Çlist.htm
       ©»content.htm
  ©Çindex.php
  ©»content.php
¿â½ ......

ÓйØphpǰ;¶þ

¹ØÓÚPHPµÄǰ;£¨¶þ£© £¨À´×Ô±¾Õ¾µÄÏûÏ¢£©
3.2ÔÚWindows 95/98/NT/2000ÉÏ¿ìËÙ°²×°Apache Web·þÎñÆ÷£¨10ÃëÖÓ£©
ÔÚWindowsÉÏÔËÐÐPHP£¬ÄãÐèÒªÒ»¸öWeb·þÎñÆ÷£¬Äã¿ÉÒÔʹÓÃ΢ÈíµÄIIS£¬Ò²¿ÉÒÔʹÓÃÃâ·ÑµÄApache ¡£ÒòΪ¿ÉÒÔͨ¹ýApacheµÄ°²×°Îļþsetup.exe½øÐа²×°£¬¿ÉÒÔΪÄã½ÚÊ¡Ðí¶àʱ¼ä¡£
PHPTtriadÊÇÒ»¸ö°üÀ¨Apache¡¢PHP¡¢MySQ ......

fedoraÏÂphp»·¾³ÅäÖÃ

±àÒë°²×°
apache
ÏÂÔØapache°²×°
=============================
ÎÒ°ÑËû°²×°ÔÚ/usr/local/apacheĿ¼ÏÂ
tar -zxvf apacheÎļþ
½øÈë½âѹºóµÄĿ¼£¬ÅäÖÃ./configure --prefix=/usr/local/apache -enable-mods-shared=all -enable-so -enable-rewrite
make
make install
È»ºóÆô¶¯/usr/local/apache/bin/apachectl sta ......

PHP×Ö·û´®ÖеĴóÀ¨ºÅ

<?php
class Model_Data_FocusData{
....
public function getData(){...}
}
class Model_Data_IndexData{
....
public function getData(){...}
}
?> 
 ÓÐÕâô¼¸¸öÀ࣬ϣÍûÄܹ»×Ô¶¯µÄ¸ù¾Ý²ÎÊýÀ´µ÷Óò»Í¬µÄÀà´¦ÀíÊý¾Ý¡£
¿´µ÷ÓÃÄ£¿é£º
<?php

function getData($act){
$class = "Mode ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØͼ | ¸ÓICP±¸09004571ºÅ