On Saturday 30 January 2010, Roy T. Fielding wrote: > > */ > > if (!conf->provider->repos->handle_get) { > > + if (r->finfo.filetype != APR_DIR) > > + r->handler = "none"; > > return DECLINED; > > } > > } > > It looks to me like that would introduce a security hole for > existing configs that expect a handler to run on GET (PHP/CGI > scripts that are authorable via DAV). -1 if so.
The recommended setup is to map separate URLs for DAV and script execution to the content. It has been like this since at least 2.0. The patch intentionally breaks existing configs that rely on the ability to use the same URLs for DAV and script execution. Is this not an acceptable change from 2.2 to 2.4 (if properly documented), as it makes life a lot easier for people who use the recommended setup?