From 20d57c8bfe61857503ae4a6f1734439e5038b37c Mon Sep 17 00:00:00 2001 From: Lukas Reschke Date: Tue, 17 Feb 2015 14:19:20 +0100 Subject: [PATCH] Remove Null Byte Check This is not relevant anymore since we require PHP 5.4 --- core/setup/controller.php | 5 ----- core/templates/installation.php | 7 ------- 2 files changed, 12 deletions(-) diff --git a/core/setup/controller.php b/core/setup/controller.php index 854c30ac76..c059a48655 100644 --- a/core/setup/controller.php +++ b/core/setup/controller.php @@ -131,10 +131,6 @@ class Controller { $databases = $setup->getSupportedDatabases(); $dataDir = $this->config->getSystemValue('datadirectory', \OC::$SERVERROOT.'/data'); - $vulnerableToNullByte = false; - if(@file_exists(__FILE__."\0Nullbyte")) { // Check if the used PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243) - $vulnerableToNullByte = true; - } $errors = array(); @@ -200,7 +196,6 @@ class Controller { 'databases' => $databases, 'directory' => $dataDir, 'htaccessWorking' => $htAccessWorking, - 'vulnerableToNullByte' => $vulnerableToNullByte, 'errors' => $errors, ); } diff --git a/core/templates/installation.php b/core/templates/installation.php index 53ab4a0b87..4e9cde205d 100644 --- a/core/templates/installation.php +++ b/core/templates/installation.php @@ -26,13 +26,6 @@ script('core', [ - -
- t('Security Warning'));?> -

t('Your PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243)'));?>
- t('Please update your PHP installation to use %s securely.', $theme->getName() )); ?>

-
-
t('Security Warning'));?>