-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
generate_rules.php: why forbid curl_exec and curl_multi_exec? #485
Comments
|
Ah yes forgot about that! I suggested a PR to protect against this. This shouldn't break much existing code as I can't see a lot of use. |
Unfortunately, curl supports a lot of protocols, I don't think a deny-list is the way to go. Moreover, another stupid vector would be SSRF as well. |
Yes but only file:// allows to fetch local files :) The best would be the ability for PHP to force the allowed CURL protocols using a ini setting. |
Not really no: having an attacker able to control the parameter of |
As with most of snuffleupagus features and rules, it will not help against all attacks, but this will still mitigate one class of attack, still useful IMHO. |
Moving from " |
Yes, but when you need to use curl, you don't have a choice :) |
Then it would make sense to comment the rule, and add a new more tailored one. The default rules are meant as a starting point/example, not as a comprehensive solution :) |
These functions cannot execute any code, they can just launch HTTP requests.
The text was updated successfully, but these errors were encountered: