-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability detected CWE ID 95 in version 4.2.0 #80
Comments
Can you share some more details about the scanner used to generate such warning, and its configuration? |
@TatianaGarcia94 no feedback? |
Estimado, |
PS: The only part of the php code which is evaluated in line 1069 that comes from an untrusted source is sanitized via this call:
I think that is sufficiently safe - unless there are attacks at play based which would fool |
In the end, I found another place where untrusted data was used to generate php code, sadly without appropriate sanitization being applied. This has now been fixed. Detailed explanation of the specific conditions in which this issue might be abused are in https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.0 Thanks for reporting this - and sorry for taking so long to fix it. I did underestimate the reported security-related tickets because there was little information provided regarding the exact problem scenario / underlying issue, and the reports seemed to come from an automated scanner tool, run without any verification of its findings, and my own experience that leads usually to a large number of false positives. |
En la ruta: /src/Wrapper.php 1069
Nombre de la vulnerabilidad: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
The text was updated successfully, but these errors were encountered: