alindeman               Wed Mar 26 21:35:18 2003 EDT

  Modified files:              
    /phpdoc/en/chapters security.xml 
  Log:
  fixing bug #22915
  
  
Index: phpdoc/en/chapters/security.xml
diff -u phpdoc/en/chapters/security.xml:1.51 phpdoc/en/chapters/security.xml:1.52
--- phpdoc/en/chapters/security.xml:1.51        Sun Jan 19 05:30:14 2003
+++ phpdoc/en/chapters/security.xml     Wed Mar 26 21:35:18 2003
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.51 $ -->
+<!-- $Revision: 1.52 $ -->
  <chapter id="security">
   <title>Security</title>
 
@@ -1011,7 +1011,7 @@
     $good_login = 1;
 }
 if ($good_login == 1) { // If above test fails, not initialized or checked before 
usage
-    fpassthru ("/highly/sensitive/data/index.html");
+    readfile ("/highly/sensitive/data/index.html");
 }
 ?>
 ]]>
@@ -1046,7 +1046,7 @@
 }
 
 if ($good_login == 1) { // can be forged by a user in get/post/cookies,
-    fpassthru ("/highly/sensitive/data/index.html");
+    readfile ("/highly/sensitive/data/index.html");
 }
 ?>
 ]]>
@@ -1060,7 +1060,7 @@
 if($_COOKIE['username']){
     // can only come from a cookie, forged or otherwise
     $good_login = 1;
-    fpassthru ("/highly/sensitive/data/index.html");
+    readfile ("/highly/sensitive/data/index.html");
 }
 ?>
 ]]>
@@ -1083,7 +1083,7 @@
     !$_GET['username'] ) {
     // Perform other checks to validate the user name...
     $good_login = 1;
-    fpassthru ("/highly/sensitive/data/index.html");
+    readfile ("/highly/sensitive/data/index.html");
 } else {
    mail("[EMAIL PROTECTED]", "Possible breakin attempt", $_SERVER['REMOTE_ADDR']);
    echo "Security violation, admin has been alerted.";



-- 
PHP Documentation Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to