On Saturday 30 January 2010, Roy T. Fielding wrote:
> >          */
> >         if (!conf->provider->repos->handle_get) {
> > +            if (r->finfo.filetype != APR_DIR)
> > +                r->handler = "none";
> >             return DECLINED;
> >         }
> >     }
> 
> It looks to me like that would introduce a security hole for
>  existing configs that expect a handler to run on GET (PHP/CGI
>  scripts that are authorable via DAV).  -1 if so.

The recommended setup is to map separate URLs for DAV and script 
execution to the content. It has been like this since at least 2.0.

The patch intentionally breaks existing configs that rely on the 
ability to use the same URLs for DAV and script execution. Is this not 
an acceptable change from 2.2 to 2.4 (if properly documented), as it 
makes life a lot easier for people who use the recommended setup?

Reply via email to