php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /opt/php-7.0.1/ext/standard/tests/general_functions/ |
files >> //opt/php-7.0.1/ext/standard/tests/general_functions/bug69646.phpt |
--TEST-- Bug #69646 OS command injection vulnerability in escapeshellarg() --SKIPIF-- <?php if( substr(PHP_OS, 0, 3) != "WIN" ) die("skip.. Windows only"); ?> --FILE-- <?php $a = 'a\\'; $b = 'b -c d\\'; var_dump( $a, escapeshellarg($a) ); var_dump( $b, escapeshellarg($b) ); $helper_script = <<<SCRIPT <?php print( "--- ARG INFO ---\n" ); var_dump( \$argv ); SCRIPT; $script = dirname(__FILE__) . DIRECTORY_SEPARATOR . "arginfo.php"; file_put_contents($script, $helper_script); $cmd = PHP_BINARY . " " . $script . " " . escapeshellarg($a) . " " . escapeshellarg($b); system($cmd); unlink($script); ?> --EXPECTF-- string(2) "a\" string(5) ""a\\"" string(7) "b -c d\" string(10) ""b -c d\\"" --- ARG INFO --- array(3) { [0]=> string(%d) "%sarginfo.php" [1]=> string(2) "a\" [2]=> string(7) "b -c d\" }y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`