PHP function name bypasses #1274
Comments
I think that the idea on rule 942430 about matching anomaly number of special chars is a good way to block this kind of patterns. Probably just for
I didn't think about this, cool! |
We will catch it as excessive non word chars and things like that not properly classify it as php injection bypass attempt, do somebody knows how to write transforms? it would be really nice to have the php equivalent |
yeah! it would be nice to have something that executes string concatenation syntaxes like: |
Is this resolved by #1294? Can we close it? |
Yes, @theMiddleBlue covered this in #1294. So this is done. Closing now. Please reopen if I'm wrong. |
In PHP code, functions are called like
system('uname')
which triggers our PHP function names blacklist. However, PHP functions can also be called as follows:Can we block these patterns, for instance with a regular expression?
Probably would be in a higher paranoia level.
The text was updated successfully, but these errors were encountered: