PHPer Kaigi 2022 ã®çºè¡¨è³æã§ãï¼ Laravel ã£ã¦ï¼ä¾¿å©ãªæ©è½ã沢山å®è£ ããã¦ãããï¼ãã£ã¬ã¯ããªæ§æããã³ãã¬ã¼ãããã®ã¾ã¾ä½¿ãã¦åå¦è ã«åªããã§ãããï¼ ããããåãï¼ã»ã¨ãã© Laravel ã®å®åçµé¨ãç¡ãã¾ã¾æ°åã§ç¤¾å ãããã¯ããå¼ãç¶ãã é ã¯ã便å©ã 便å©ã ãã¨Lâ¦
Posted By Charles Fol laravel rce debug file write file read CVE-2021-3129 Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)In late November of 2020, during a security audit for one of our clients, we came accross a website based on Laravel. While the site's security state was pretty good, we remarked that it was running in debug mode, thus displaying verbose error messages inclu
ãã®è¨äºã¯ Laravel Advent Calendar 2020 - Qiita æçµæ¥ã®è¨äºã§ãã TL;DR DDD ã "çã®" ã¯ãªã¼ã³ã¢ã¼ããã¯ãã£ã¯ï¼ Web æ¥çã«ããã大æµã®ç¾å ´ã§ã¯ãªã¼ãã¼ã¹ããã¯ã ãï¼å°å ¥ãã¦ãå ¨å¡ãã¤ãã¦ãããã¨ã¯éããªã app/UseCases ãã£ã¬ã¯ããªã ãåã£ã¦ï¼ãã¡ã¤ã³ãã¨ã«åä¸è²¬åãªã¯ã©ã¹ãç½®ãã¨ä½¿ããããã ActiveRecord æåã®ãã¬ã¼ã ã¯ã¼ã¯ã§ Repository ãã¿ã¼ã³ãç¡çã«å°å ¥ããã¨æ»ã¬ã®ã§ï¼ UseCase 㧠Eloquent Model ã®æ©è½ã使ããã¨ãæãã㪠ã¯ããã« Zenn ã§ã¯åæ稿ã§ããæ¥æ¬ã® Laravel ã³ãã¥ããã£ã§ã¯ããã馴æã¿ã®ããã§å®ã¯ãã¾ãé¡ãåºãã¦ããªãï¼ï¼ï¼ @mpyw ã¨ç³ãã¾ãããªã³ã©ã¤ã³ãµãã³ã®ç«ä»ãå½¹ã¨ãªã£ã Synapse ãæåã®ä»äºã§ãããï¼å°±è·å¾ããä¼ç¤¾ã
Speaker Deck This deck requires a password Password
ããã«ã¡ã¯ãã¨ã³ã¸ãã¢ã® @localdisk ã§ãã2017/09/27ã« CVE-2017-14775 ã¨ãã Laravel ã®èå¼±æ§ãå ±åããã¾ãããCVE-2017-14775 ã¯ãªã¼ããã°ã¤ã³å¦çã«*1ã¿ã¤ãã³ã°æ»æã®èå¼±æ§ãããã¨ãããã®ã§ãã ã¿ã¤ãã³ã°æ»æã«ã¤ãã¦ã¨ãã®å¯¾çã«ã¤ãã¦ã¯ä¸è¨ã¨ã³ããªã«è©³ããã¾ã¨ã¾ã£ã¦ãã¾ãã PHPæ¬ä½ã§ã¿ã¤ãã³ã°æ»æãé²å¾¡ã§ããããã«ãªãã¾ã | yohgaki's blog ãã®èå¼±æ§ã¯ 2017/09/21 ã«ãªãªã¼ã¹ããã 5.5.10 ã§ä¿®æ£ããã¦ãã¾ãã対象ã®ã¯ã©ã¹ã¯ä¸è¨ã«ãªãã¾ãã Illuminate\Auth\DatabaseUserProvider Illuminate\Auth\EloquentUserProvider ä¿®æ£ããã PR ã¯ä¸è¨ã«ãªãã¾ãã [5.5] [Security] Close remember_
ä¸è¨ã®5ãã¬ã¼ã ã¯ã¼ã¯ã®å¹³åã¯3.8%ã§ãããæ¥æ¬äººã®äººå£ã¯ä¸çã®2%ã«æºããªãã§ãã®ã§ãããã¨æ¯è¼ããã¨å¤ãã§ããããããä¸çã®ã¤ã³ã¿ã¼ããã人å£ã¯2016å¹´ã§34å9åä¸äººãããã®ã§ãããã ã¨äººå£æ¯ã§ãããªã«å¤ãã¯ãªãã§ããã 詳細 CakePHP https://github.com/cakephp/cakephp/graphs/contributors chinpei215 waterada nojimage suzuki 8 commitsï¼100ä½ã®Contributorã®ã³ãããæ°ï¼ CodeIgniter https://github.com/bcit-ci/CodeIgniter/graphs/contributors kenjis katsew TakayukiSakai 5 commits FuelPHP https://github.com/fuel/core/gr
ã¯ããã« HTMLã§inputã®nameå±æ§ãname="hoge[]"ã®ããã«æå®ãã¦ããã¨PHPãªã©ã®ãµã¼ããµã¤ãã«é åã¨ãã¦Submitã§ãããã¨ãç¥ããã¦ãããï¼PHPãã¬ã¼ã ã¯ã¼ã¯ã使ã£ã¦ããã¨ãã®ãã¼ã¿ãããã«ããªãã¼ã·ã§ã³ã«ããããã¨ãã»ã¨ãã©ãã¨æãï¼ ããã¥ã¡ã³ãã§ããªããªããã®ææ³ã«ã¤ãã¦è§£èª¬ããã¦ããªããã¨ãå¤ãï¼é ãæ©ã¾ãã¦ãã人ãããã®ã§ã¯ï¼ ä¸å¿ã»ã¨ãã©ã®ã¡ã¸ã£ã¼ãªææ°PHPãã¬ã¼ã ã¯ã¼ã¯ã«ããã¦ä¸è¨ã®ããªãã¼ã·ã§ã³å¦çã¯æ¨æºã®ç¯å²å ã§å¯è½ãªã®ã§ï¼ãã®æ¹æ³ã«ã¤ãã¦ã®ã¾ã¨ãï¼ PHPãã¬ã¼ã ã¯ã¼ã¯ãªã¹ã ãã®è¨äºã§åãä¸ãã¦ããPHPãã¬ã¼ã ã¯ã¼ã¯ãªã¹ãï¼ä¸å¿æ¥æ¬ã§ãããªãã«ä½¿ããã¦ãããã®ãéæ追å äºå®ï¼CakePHPã¯ç¥ããï¼ãã®ä»ã¯ã³ã¡ã³ããªã©ã§è¦æãããã°è¿½å ããã¤ããï¼ FuelPHP 1.7.* Laravel 5.1.* CodeIgniter 3.
{ if (! this.initialized) { search.start(); this.initialized = true; } if (value) { setTimeout(() => { this.$el.querySelector('input').focus(); }, 100); } }); }, }" x-dialog x-model="searchModalIsOpen" x-cloak class="fixed inset-0 z-10" @keydown.slash.meta.window="searchModalIsOpen = !searchModalIsOpen" @keydown.k.meta.window="searchModalIsOpen = !searchModalIsOpen" @keydown.escape.window="searchM
Laravel - PHP Object Injection - 4.1, 4.2, 5.0, master From: Scott Arciszewski <scott () paragonie com> Date: Sun, 19 Apr 2015 14:12:23 -0400 Hi FD Readers, If you're using cookie-based session storage with any version of the Laravel Framework since 4.1 (inclusive), and you turned encryption off (I can't imagine why anyone would do that, but I've seen some weird setups), you are vulnerable to PHP
PHPã§ã®ããæå³ãå ¸åçãªèå¼±æ§ãã ã£ãã®ã§è¨äºãæ¸ããã¨ã«ãã¾ããã Laravel 4ã®CSRFèå¼±æ§ã¨ã¯ï¼ Laravel 4.2.10以åã«CSRFä¿è·ãç¡å¹ã«ãªãèå¼±æ§ãå ±åããã¾ããã ãã®èå¼±æ§ã¯ãLaravelæ¨æºã®CSRFä¿è·ï¼csrfãã£ã«ã¿ï¼ãç°¡åã«ç¡å¹åãããã¨ãã§ãããã®ã§ãã æ¢åãµã¤ãã§ã¯ãä»ããã以ä¸ã®ä¿®æ£ããããæè¦ããå¿ è¦ãããã¾ããLaravelã®ã¢ãããã¼ãã§ã¯ä¿®æ£ããã¾ããã From ba0cf2a1c9280e99d39aad5d4d686d554941eea1 Mon Sep 17 00:00:00 2001 From: Taylor Otwell <taylorotwell@gmail.com> Date: Sun, 9 Nov 2014 16:29:56 -0600 Subject: [PATCH] Check type of toke
On November 7th, Chris Smith (@chrismsnz) of Insomnia Security alerted the Laravel development team of a method of bypassing the CSRF verification in Laravel 4 applications. To patch your applications, modify the default CSRF route filter in the app/filters.php file to the following: Route::filter('csrf', function() { if (Session::token() !== Input::get('_token')) { throw new Illuminate\Session\To
We help clients bring digital products and services to market. http://aculios.com/ There is a handy method in the Redirect class that conveniently returns the user back to the previous page they came from. This method is named back() and is called like so: return Redirect::back() Avoid this handy method as it will bring you pain and suffering. It will also cause your teammates to burst out in fits
PHP5.5.13ã®ãã«ãã¤ã³ãµã¼ãã¼ã§ãYii2.0-betaã®DBã¢ã¯ã»ã¹ãå«ããå®è£ ããã³ããã¼ã¯ãã¹ããã¦ã¿ã¾ããããããã³ããã¼ã¯ã¯æå³ãç¡ãã¨ãããã®ã¯ãã·ã§ãã HelloWorldãã³ãã ã¨ãã«ã¼ãã£ã³ã°ã¨ãã¥ã¼ã®ãªã¼ãã¼ããããæ¯è¼ããããã§ãã¾ãããç°¡åã«ãã¼ãã§ãã¦ãã¾ãã¾ãããã¼ã¿ãã¼ã¹æ¥ç¶ãªã©ã®ã©ã¤ãã©ãªãããªãã¼ããã¦ããæ¹ãä¸å©ã«ãªã£ã¦ãã¾ãã¾ããYii1ã¯å ¬å¼çºè¡¨ã®HelloWorldãã³ãããã°æãã¦éãã£ã(æ°ããã»ã¨ãã©ã®ã³ã¼ãã¯å¿ è¦ã«ãªãã¾ã§ãã¼ããããªããã¨ã表ãã¦ããããã)ã®ã§ãããããããé¨åã ããéç«ããã¦ãã ããå ¨ä½ãéã/é ãã¨èããã®ã¯ããããã§ãã ããã§ãpostã¨commentãã¼ãã«ãæã¤åããã¼ã¿ãã¼ã¹ã«æ¥ç¶ãã¦ãpostãã¼ã¿ã1件ã¨ããã«ä»éããã³ã¡ã³ãããã¹ã¦åå¾ãã(å®éã«ã¯ãã¼ã¿ã1件ã ããã)å¦çãå«ã¿ã¾ããã
Symfony 2.5.0ã¨Laravel 4.2.1ããã³ããã¼ã¯ãã¦ã¿ã¾ããã ãã³ããã¼ã¯ç°å¢ XAMPP 1.8.3-4 for Linux (32bit) PHP 5.5.11 Zend OPcache v7.0.4-dev Apache 2.4.9 ãã³ããã¼ã¯æ¹æ³ ãããããHello Worldããã³ããã¼ã¯ã§ãããã¬ã¼ã ã¯ã¼ã¯ã®æå°ã®ãªã¼ãã¼ããããè¨æ¸¬ããããã®ãã®ã«ãªãã¾ãã詳細ã¯ã½ã¼ã¹ã³ã¼ãï¼å¾è¿°ï¼ãã覧ãã ããã 以ä¸ã®ãããªã³ãã³ãã§è¨æ¸¬ãã¾ããã $ siege -b -c 10 -t 3S http://localhost/symf/hello?name=BEAR ãã³ããã¼ã¯çµæ Symfony Laravel
ãç¥ãã
é害
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}