Exploiting Common Vulnerabilities in PHP Applications

Thursday, 26 September 2002, 1:39 AM EST

PHP has the following characteristics:
- Interpreted,
- Fast Execution - The interpreter is embedded in the web server, no fork() or setup overhead
- Feature Rich - Hundreds of non trivial builtin functions
- Simple Syntax - Non declared and loosely typed variables, 'wordy' function names

Over the course of this paper I'm going to try to explain why I feel the last two characteristics make applications written in PHP easy to attack and hard to defend. Then I'll finish off with a rant about distribution of 'blame' when it comes to software security.

[ Read more ]




Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //