
28.05.2006, 15:28
|
|
Новичок
Регистрация: 27.05.2006
Сообщений: 21
Провел на форуме: 160594
Репутация:
3
|
|
В чём разобрался сам:
(3) inject some php code inside jpeg files as EXIF metadata content:
this, in combinations with third party vulnerable code can be used
to compromise the server where PHP is installed.
Should be enough to check for php code inside the temporary files
before to copy the new avatar in "images/avatars/" folder
Решение тут:
http://www.php.net/image
http://www.zend.com/manual/ref.exif.php
http://us2.php.net/exif
|
|
|