ID: 36298 User updated by: the dot spikey at gmail dot com Reported By: the dot spikey at gmail dot com Status: Bogus Bug Type: Filesystem function related Operating System: At least *nix PHP Version: 4.4.2 New Comment:
Originally found by Rein Krul, submitted & commented by Spiked. Previous Comments: ------------------------------------------------------------------------ [2006-02-05 21:40:42] [EMAIL PROTECTED] Sorry, but your problem does not imply a bug in PHP itself. For a list of more appropriate places to ask for help using PHP, please visit http://www.php.net/support.php as this bug system is not the appropriate forum for asking support questions. Due to the volume of reports we can not explain in detail here why your report is not a bug. The support channels will be able to provide an explanation for you. Thank you for your interest in PHP. If a process writes a file then it definitely has enough privileges to do it, or you should complain to your OS developers. ------------------------------------------------------------------------ [2006-02-05 21:34:53] the dot spikey at gmail dot com Description: ------------ The COPY function can write/read files where you have no permission to. (Maybe in combination with the tempnam function, maybe without). Reproduce code: --------------- $tempfn = tempnam("",""); $temp = fopen($tempfn, "w"); fwrite ($temp, $newtxt); copy ($tempfn, "mysql.php"); Expected result: ---------------- Line 1: $tempfn = the created temporary filename. Line 2: Open the temp. file with write access. Line 3: write your text $newtxt in $temp. Line 4: Copy your newly created temporary file over mysql.php, even without write access. Actual result: -------------- (same as above) Line 1: $tempfn = the created temporary filename. Line 2: Open the temp. file with write access. Line 3: write your text $newtxt in $temp. Line 4: Copy your newly created temporary file over mysql.php, even without write access. ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=36298&edit=1