-
-
Notifications
You must be signed in to change notification settings - Fork 629
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disclosing critical information stored in $_SERVER #124
Comments
I work on a related project have a few thoughts on this:
Don't know how @vlucas feels about this, but those are my thoughts. |
@olvlvl Tools like whoops only prints exceptions stack traces and dumps superglobals when in development mode. Even if phpdotenv excludes variables from That said, phpdotenv could definitely provide an option in a non BC-breaking way that would not write to |
@vlucas +1 for I do not print debugging information to the screen in Production, however, I do like to log |
From my point of view, it would definitely be an improvement if |
+1 |
Hi,
Exception handling tools such as filp/whoops are dumping
$_SERVER
, possibly disclosing critical information put there byphpdotenv
. This is a security issue that could easily be fixed. What's the point in having this values in$_SERVER
in the first place? If you setup environment variables properly they are not polluting$_SERVER
. More over, environment variables should be read from$_ENV
or obtained usinggetenv()
, not$_SERVER
although it may seem handy.As an example when a run
ICANBOOGIE_INSTANCE=dev php -S localhost:8000
,ICANBOOGIE_INSTANCE
is not in$_SERVER
but can be read from$_ENV
or obtained usinggetenv()
.Your tool is introducing a double standard.
What do you think?
The text was updated successfully, but these errors were encountered: