PHP patch exec_dir

Progamming language PHP allows one to limit executing of external commands via configuration directive safe_mode. This directive should contain full path to a directory conatining programs which PHP script can run. If the script tries to execute a command not located in this directory, the command is not executed. This configuration directive is active only if safe mode is enabled, which means more and sometimes unwanted restrictions to users.

PHP has no known possibility to limit executing of external commands with disabled safe mode. Teherefore, here is a patch adding special directive exec_dir straightly into PHP. This directive is very similar to safe_mode_exec_dir, but safe mode has not to be enabled.

This patch limits executing commands via functions from the exec family, i. e. exec(), system() or popen().

Reviews

There are no comments available yet.

Here you can write a comment


Please enter at least 10 characters.
Loading... Please wait.
* Pflichtangabe
ANG GES G P
Mit unserem Script CP::PERSOCHECK wird die Personalausweisnummer und das Alter eines Users überprüft. Bei korrekter Eingabe, wird der User weit ...
ANG GES G P
php_pam is a shared library which provides PAM (Pluggable Authentication Modules) bindings for PHP. The package includes sample PHP code and a hel ...
ANG GES G P
PHP Passwort-Generator ist ein PHP-Script zur automatischen Generierung von Passwörtern. Anhand von Listen können Optionen wie die Anzahl der Pa ...
ANG GES G P
Mit diesem Script könnnen sie ihre Passwörter verschlüsseln. Es ist unmöglich es wieder zu entschlüsseln und man kann wahlweise die Zeichenlà ...
ANG GES G P
Use this script in your contact form, for you whois query tool or just there where some extra validation is needed. A session will be created insi ...
ANG GES G P
Class to crypt and decrypt data
ANG GES G P
A long, long time ago, during my early days with Web application development, I was asked to write an administration module for a Web site. This m ...
ANG GES G P
The MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash. It is often used to save sensitive data like passwords in a database or ...
1132 x viewed
0 x memorized
Details to the advertisement
ANG GES G P
Make a request

You are no longer logged in as a user. Please enter your name and your E-mail-adress!

Loading... Please wait.
Details to the seller