From dc41cf081cac227f0d73b56542fa6295285e170c Mon Sep 17 00:00:00 2001 From: Lukas Reschke Date: Wed, 20 Mar 2013 08:43:54 +0100 Subject: [PATCH] Check if the installed PHP version has a fix for the nullbyte vulnerability --- core/setup.php | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/core/setup.php b/core/setup.php index 77eed5376d..b61590e9e4 100644 --- a/core/setup.php +++ b/core/setup.php @@ -18,6 +18,10 @@ $hasPostgreSQL = is_callable('pg_connect'); $hasOracle = is_callable('oci_connect'); $hasMSSQL = is_callable('sqlsrv_connect'); $datadir = OC_Config::getValue('datadirectory', OC::$SERVERROOT.'/data'); +$vulnerableToNullByte = false; +if(file_exists(__FILE__."\0Nullbyte")) { // Check if the used PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243) + $vulnerableToNullByte = true; +} // Protect data directory here, so we can test if the protection is working OC_Setup::protectDataDirectory(); @@ -31,6 +35,7 @@ $opts = array( 'directory' => $datadir, 'secureRNG' => OC_Util::secureRNG_available(), 'htaccessWorking' => OC_Util::ishtaccessworking(), + 'vulnerableToNullByte' => $vulnerableToNullByte, 'errors' => array(), );