diff options
author | Lukas Reschke <lukas@statuscode.ch> | 2013-03-20 11:43:54 +0400 |
---|---|---|
committer | VicDeo <victor.dubiniuk@gmail.com> | 2013-03-31 16:51:12 +0400 |
commit | a004266b7c0acfacf9d544fb3930c11db3a8283c (patch) | |
tree | 98135234d0bff63e7f4149c96eccd7fc779960cb | |
parent | da96d1adb02a9801cf314178507049e7383ce56a (diff) |
Check if the installed PHP version has a fix for the nullbyte vulnerability
-rw-r--r-- | core/setup.php | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/core/setup.php b/core/setup.php index 77eed5376d6..b61590e9e4b 100644 --- a/core/setup.php +++ b/core/setup.php @@ -18,6 +18,10 @@ $hasPostgreSQL = is_callable('pg_connect'); $hasOracle = is_callable('oci_connect'); $hasMSSQL = is_callable('sqlsrv_connect'); $datadir = OC_Config::getValue('datadirectory', OC::$SERVERROOT.'/data'); +$vulnerableToNullByte = false; +if(file_exists(__FILE__."\0Nullbyte")) { // Check if the used PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243) + $vulnerableToNullByte = true; +} // Protect data directory here, so we can test if the protection is working OC_Setup::protectDataDirectory(); @@ -31,6 +35,7 @@ $opts = array( 'directory' => $datadir, 'secureRNG' => OC_Util::secureRNG_available(), 'htaccessWorking' => OC_Util::ishtaccessworking(), + 'vulnerableToNullByte' => $vulnerableToNullByte, 'errors' => array(), ); |