Ò»Ö±¶¼ÒÔΪÔÚPHPÖУ¬' ºÍ"ÊÇûÓÐÇø±ðµÄ£¬½ñÌì¿´ÁËÖÐÔ´óѧËïÖÙÔÀÀÏʦµÄÊÓÆµ½Ì³Ì£¬²Å·¢ÏÖ£¬ÕâÁ½ÕßÓ÷¨ÊÇÓÐÇø±ðµÄ£¬¾Ù¸ö¼òµ¥µÄÀý×Ó£º
1.php
<?$str='±ù¶³Óã';
echo '$str µÄ²©¿ÍµØÖ·ÊÇhttp://www.webxuexi.net' ;//×¢ÒâÕâÀïÊǵ¥ÒýºÅŶ
?>
2.php
<?
$str='±ù¶³Óã';
echo "$str µÄ²©¿ÍµØÖ·ÊÇhttp://www.webxuexi.net"; //×¢ÒâÕâÀïÊÇË«ÒýºÅŶ£¬$strºóÓпոñ
?>
3.php
<?
$str='±ù¶³Óã';
echo $str.'µÄ²©¿ÍµØÖ·ÊÇhttp://www.webxuexi.net'; //ÕâÀﵥ˫ÒýÎÞÓ°Ï죬¾Ý˵µ¥ÒýËÙ¶È¿ì
?>
´ó¼Ò¿´½á¹û¾Í¿ÉÒÔÖªµÀ1.phpÏÔʾµÄÊǵ¥ÒýºÅÀïµÄÄÚÈÝ£¬²¢Ã»ÓаÑ$str»»³É"±ù¶³Óã",¼´ÏÔʾ“$str µÄ²©¿ÍµØÖ·ÊÇhttp://www.webxuexi.net”¶ø2.phpºÍ3.php¶¼°Ñ$str»»³ÉÁË"±ù¶³Óã"£¬¼´ÏÔʾµÄÊÇ“±ù¶³Ó㠵IJ©¿ÍµØÖ·ÊÇhttp://www.webxuexi.net”,
ÕâÑùÒ»¿´£¬Çø±ð¾ÍºÜÃ÷ÏÔÁË£¬µ¥ÒýºÅ»á°ÑÀïÃæµÄ±äÁ¿ÃûÒ²µ±×÷×Ö·û´®´¦Àí¡£¶øË«ÒýºÅ»á×Ô¶¯²éÕÒÀïÃæµÄ±äÁ¿Ãû£¬²¢Ìæ»»£¬ÕâÀïҪעÒâһϣ¬±äÁ¿ÃûºóÈç¹û¸úµÄÊÇÒ»¸öÆÕͨµÄ×Ö·û£¨²»°üÀ¨±êµã·ûºÅ£¬È綺ºÅ£©£¬Ò»¶¨ÒªÔÚ±äÁ¿Ãûº ......
×öPHP³ÌÐòµÄÈ˶¼ÖªµÀhtmlentitiesºÍhtmlspecialcharsº¯Êý£¬¶¼ÊǸñʽ»¯html´úÂëµÄ£¬µ«ÊÇÕâ¶þ¸öº¯ÊýÊÇ·ñÕæµÄ¹¦ÄÜÒ»ÑùÂ𣿠php³ÌÐòÔ±Ö®¼Ò ÕâÁ½¸öº¯ÊýÔÚ¸ñʽ»¯´øÓÐÓ¢ÎÄ×Ö·ûµÄhtml´úÂëµÄʱºò»ù±¾Ã»É¶ÎÊÌ⣬µ«ÊÇhtmlentities¶ÔÖÐÎÄ×Ö·ûÒ²²»·Å¹ý£¬ÕâÑùµÃ³öÀ´µÄ½á¹ûÊÇÖÐÎÄ×Ö·û²¿·Ö±äΪһ¶ÑÂÒÂë¡£µ±Ê±×öÓ¢ÎÄÕ¾µÄʱºò¸ù±¾¾Íû¾õ²ìµ½Õâ¸öÎÊÌ⣬¶ø½ñÌ칫˾µÄÒ»¸öÊÕ²ØÕ¾È´ÒòΪÓÐÓзÇÓ¢ÎÄ×Ö·û¶ø³öÏÖÁËÎÊÌ⣬ÎÒ×îÖÕ²é³öÀ´ÊÇ htmlentitiesÕâ¸öº¯ÊýµÄÎÊÌ⣬ͬʱÎÒÒ²ÕÒµ½ÁËhtmlspecialcharsÕâ¸öº¯Êý¡£
¶ÔÓÚÕâÁ½¸öº¯Êý£¬phpÊÖ²áÉ϶¼ÊÇÓ¢ÎÄ×öµÄ½âÊÍ£¬ÆäÖÐÔÚhtmlentitiesº¯ÊýµÄ˵Ã÷²¿·ÖÓÐÕâôһ¶ÎÓ¢ÎÄ£º
This function is identical to htmlspecialchars() in all ways, except with htmlentities(), all characters which have HTML character entity equivalents are translated into these entities.
´ÓÕâ¾ä»°ÖÐÎÒÃÇÒ²¿ÉÒÔ¿´³öÀ´ÕâÁ½¸öº¯ÊýËäÈ»»ù±¾¹¦Äܲ¶à£¬µ«ÊÇ»¹ÊÇÓÐϸ΢µÄ²î±ðÔÚÀïÃæµÄ¡£ÔÙ×Ðϸ¿´htmlspecialcharsº¯ÊýÀïÃæµÄÒ»¶Î»°£º
The translations performed are:
¡®&' (ampersand) becomes ¡®&'
¡®¡±¡® (double quote) becom ......
PHP ÖÐÇÉÓÃÊý×é½µµÍ³ÌÐòµÄʱ¼ä¸´ÔÓ¶È
±¾ÎÄÖ÷ÒªÊǽéÉÜÔÚ PHP µÄ±à³ÌÖУ¬ÈçºÎÇÉÓÃÊý×éÀ´½µµÍÒò¶à²ãÑ»·¶øÒýÆðµÄʱ¼ä¸´ÔӶȵÄÎÊÌâ¡£ÌØ±ðÊǵ±³ÌÐòÐèÒª¶à´ÎÓëÊý¾Ý¿â½»»¥Ê±£¬Óô˷½·¨À´ÓÅ»¯ÄãµÄ´úÂ룬½«»á´ø¸øÒâÏë²»µ½µÄЧ¹û¡£
ͨ³£¿ª·¢ÈËÔ±ÔÚд³ÌÐòµÄʱºò£¬ÍùÍùÊǰÑÒѾÉè¼ÆºÃ»òÕß¹¹Ë¼ºÃµÄÔËËãÂß¼£¬Ö±½ÓÓñà³ÌÓïÑÔ·Òë³öÀ´¡£³ÌÐòÄÜ˳Àû±àÒëͨ¹ý£¬ÄÇÊǺÜÁîÈ˸ßÐ˵ÄÊÂÇé¡£Èç¹û´Ëʱ³ÌÐòµÄÔËÐÐʱ¼ä»¹ÄܽÓÊÜ£¬¾Í»á³Á½þÔÚд´úÂëµÄ³É¾Í¸Ðµ±ÖУ¬³£³£ÔÚÕâ¸ö¹ý³ÌÖкöÂÔ´úÂëµÄÓÅ»¯¡£Ö»Óе±³ÌÐòÔËÐÐËÙ¶ÈÊܵ½Ó°Ïìʱ£¬²Å»Ø¹ýÍ·È¥¿¼ÂÇÓÅ»¯µÄÊÂÇé¡£
ʲôÊÇËã·¨µÄʱ¼ä¸´ÔÓ¶È
ʱ¼ä¸´ÔÓ¶ÈÊÇ¿ª·¢ÈËÔ±ÓÃÀ´ºâÁ¿Ó¦ÓóÌÐòËã·¨ÓÅÁÓµÄÖ÷ÒªÒòËØ¡£¿Í¹ÛµØËµ£¬Ëã·¨µÄÓÅÁÓ³ýÁ˺Íʱ¼ä¸´ÔÓ¶ÈÓйأ¬»¹Óë¿Õ¼ä¸´ÔÓ¶ÈÃÜÇÐÏà¹Ø¡£¶øËæ×ÅÉ豸Ӳ¼þÅäÖõIJ»¶ÏÌáÉý£¬¶ÔÖÐСÐÍÓ¦ÓóÌÐòÀ´Ëµ£¬¶ÔËã·¨µÄ¿Õ¼ä¸´ÔӶȵÄÒªÇóÒ²¿íËÉÁ˲»ÉÙ¡£²»¹ý£¬ÔÚµ±½ñ Web2.0 ʱ´ú£¬¶ÔÓ¦ÓóÌÐòµÄʱ¼ä¸´ÔÓ¶ÈÈ´ÓÐÁ˸ü¸ßµÄÒªÇó¡£
ʲôÊÇËã·¨µÄʱ¼ä¸´ÔÓ¶ÈÄØ£¿¸ÅÒªÀ´Ëµ£¬ÊÇÖ¸´ÓËã·¨ÖÐѡȡһ¸öÄÜ´ú±íËã·¨µÄÔ²Ù×÷£¬ÒÔÔ²Ù×÷ÖØ¸´Ö´ÐеĴÎÊý×÷ΪËã·¨µÄʱ¼äÁ¿¶È¡£Ó°Ïìʱ¼ä¸´ÔӶȵÄÒòËØÓÐÁ½¸ö£ºÒ»ÊÇÔ²Ù×÷µÄÖ´ÐÐʱ¼ä£¬¶þÊÇÔ²Ù× ......
ÍøÉϹØÓÚÕâÀàµÄÌû×ÓÕæµÄºÜ¶à£¬µ«ÊÇÎÒÊÔÁ˺ܶ࣬ÀýÈç°Ñphp plus for eclipse ÏÂÔØÏÂÀ´£¬½âѹºó·Åµ½EclipseµÄpluginÀïÃæ£¬µ«ÊDz»ÖªµÀΪʲô£¬¶¼²»¹ÜÓá£
ÎÒ´ÓÍøÉÏÕÒµ½ÁËÒ»ÖֱȽϼòµ¥µÄ·½·¨£ºÄǾÍÊÇÓÉEclipse×Ô¼ºÀ´¸üÐÂ×Ô¼ºµÄ×é¼þ£¬ÕâÑùµÄ·½·¨Ê¡È¥Á˺ܶàµÄÅäÖ㬿ÉÒÔÖ±½ÓÄÃÀ´Ê¹Óá£
·½·¨£º
´ò¿ªEclipse->Help->Software Updates->Find and installed->Search for new features to install->New Remote Site:
ÔÚµ¯³öµÄ¶Ô»°¿òÖÐÊäÈë name£ºEclipseforphp£¨ÈÎÒ⣩
URL £ºhttp://phpeclipse.sourceforge.net/update/stable/1.2.x/site.xml
µã»÷È·¶¨ºó£¬¾Í¿ÉÒÔ×Ô¶¯Á´½Ó£¬È»ºóÑ¡ÖÐ3Ï´óÖ°üÀ¨Eclipse¿ª·¢×é¼þ£¬debug×é¼þµÈ¡£Ñ¡Öа²×°¾Í¿ÉÒÔÁË¡£
& ......
OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
affected OpenX versions. These would check magic bytes of an uploaded
file to determine its MIME type, and erroneously assume this
information to be reliable. Additionally, while the file name of
uploaded files is changed, the file extension is not.
As such, it is possible to upload image files with embedded PHP code and
.php file extension. Unless PHP script execution is explicitly prevented
for the file upload location (which has not been documented in the OpenX
manual so far and it is not the result of a default installation), the
PHP code will execute as soon as HTTP access to the file location will
cause it to be executed by the web server.
To clarify, an attacker exploiting thi ......
BUGTRAQ ID: 36555
CVE ID: CVE-2009-3557
PHPÊǹ㷺ʹÓõÄͨÓÃÄ¿µÄ½Å±¾ÓïÑÔ£¬ÌرðÊʺÏÓÚWeb¿ª·¢£¬¿ÉǶÈëµ½HTMLÖС£
PHPµÄtempnam()ÖеĴíÎó¿ÉÄÜÔÊÐíÈÆ¹ýsafe_modeÏÞÖÆ¡£ÒÔÏÂÊÇext/standard/file.cÖеÄÓЩ¶´´úÂë¶Î£º
PHP_FUNCTION(tempnam)
{
char *dir, *prefix;
int dir_len, prefix_len;
size_t p_len;
char *opened_path;
char *p;
int fd;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &dir, &dir_len,
&prefix, &prefix_len) == FAILURE) {
return;
}
if (php_check_open_basedir(dir TSRMLS_CC)) { [1]
RETURN_FALSE;
}
php_basename(prefix, prefix_len, NULL, 0, &p, &p_len TSRMLS_CC);
if (p_len > 64) {
p[63] = '\0';mud pump
}
if ((fd = php_open_temporary_fd(dir, p, &opened_path TSRMLS_CC)) >= 0) {
close(fd);
RETVAL_STRING(opened_path, 0);
}
efree(p);
}
ÔÚ[1]´¦tempnam()º¯Êý½ö¼ì²éÁËopen_basedirÖµ¡£
<*²Î¿¼
http://securityreason.com/securityalert/6601
http://secunia.com/advisories/37412/
*>
SEBUG°²È«½¨Òé:
³§É̲¹¶¡£º
PHP
---
Ŀǰ³ ......