-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No supported modules should use file_get_contents
to access external URLs
#228
Comments
I have a feeling that the use of |
As noted on the CWP announcement, this was only planned to affect new stacks for now. Once the change had been rolled out, further work would be done to find any affected stack code and get it resolved prior to disabling those values for existing stacks. In addition, CWP developer docs were updated to indicate why it shouldn't be used. |
I believe the ticket title should be "No supported modules should use |
file_get_contents
file_get_contents
to access external URLs
I'm finding it hard to justify this as a bug to be honest... but since the announcement calls it a "low impact security risk" then I guess we will |
Are we doing this for SS3 as well? |
I believe this should focus on new stacks, so it would make sense to target the latest CWP 2 release. |
Background
CWP Ops were about to release PHP ini changes that disabled
allow_url_fopen
andallow_url_include
which would prevent the use of file_get_contents() in particular with URLs.This release had to be postponed because it was discovered some supported modules are still using this function.
Overview
We need to investigate all supported modules (and 3rd party dependancies) to identify where
file_get_contents
is being used and update it to something more secure.The use of Guzzle (or raw curl) is encouraged for security reasons, mainly to prevent accidental remote code execution/remote file inclusion bugs.
Release considerations
This improvement would focus on new stacks so we would only need to fix it in a new CWP 2 release.
Modules identified so far
The text was updated successfully, but these errors were encountered: