[nycphp-talk] Input whitelist validation warning
Chuck Hagenbuch
chuck at horde.org
Thu May 17 18:37:32 EDT 2007
Quoting Cliff Hirsch <cliff at pinestream.com>:
> I just discovered a hole in a white list validation technique I bored from a
> PHP security book no, not Chris¹ book.
>
> Beware in_array($_POST/GET[input¹], $whitelist)
>
> Type matters. All input is string type and PHP will try to force type
> matching.
>
> So the input string securityhole¹ will match the int number 0.
This is the kind of thing that the third argument to in-array is for -
forces strict type checking:
http://us2.php.net/in-array
-chuck
More information about the talk
mailing list