TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

PHP apps plagued by Mark of the Beast bug

17 pointsby _grrrover 14 years ago

3 comments

yuvadamover 14 years ago
TFA is plagued with technical inconsistencies, and generally looks like a classic copy-paste job.<p>Either address a technical crowd, and use proper technical terms, or use plain language anyone can understand.<p>"GET protocol"?<p>"adding a “-ffloat-store” flag to CFLAGS"??? Do they even know what this means?
评论 #2070586 未加载
Udoover 14 years ago
It's worth noting that a simple input-sanitizing <i>if</i> statement applied across the $_REQUEST variable can eliminate this vulnerability, a measure that every PHP dev can use right now regardless of admin access to compile a new executable.<p>Also, yesterday, there was a poster in here claiming that PHP's json_decode() of an object like {"motb":"2.22507385851e-308"} would trigger the vulnerability whether the number was enclosed in quotes or not. I have since determined that this claim is false, json_decode() did not trigger the problem with or <i>even without</i> the quotes. In fact, the only way I was able to reliably cause the crash was by casting variables from the $_REQUEST array as float - a behavior that can be safeguarded against pretty easily.<p>Obviously, this is a serious issue, but it's an attack apps can be hardened against with minimal effort. For comparison, a buffer overflow vuln on the string type would be much, much more disastrous. So we're going to have to run an extra line of input sanitization for a while, that's all.
评论 #2072053 未加载
dmoneyover 14 years ago
Is Mark of the Beast a common term for this type of bug (triggered by a certain number)? Never heard it before.
评论 #2071097 未加载