PHP Security Code Review – Potentially Dangerous PHP Functions

The first set are inputs, not functions. 😀
See the PHP Language Reference for function docs

Form/Script Inputs

    $_
    $_GET
    $_POST
    $_REQUEST
    $_SERVER

Command execution

    shell_exec
    system
    exec
    popen
    passthru
    proc_open
    pcntl_exec

Code execution

    eval
    assert
    preg_replace |  grep “/e”
    create_function
    SQL injection
    $sql

Information disclosure

    phpinfo

Development functionality

    debug
    $_GET['debug']
    $_GET['test']

File inclusion

    file_include
    include
    require
    include_once
    require_once

Filesystem functions

    fwrite
    file_get_contents
    fopen
    glob
    popen
    file
Advertisements

2 responses to “PHP Security Code Review – Potentially Dangerous PHP Functions

  1. Pingback: PHP Security Code Review – Potentially Dangerous PHP Functions | Adam Muntner

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s