Using this function you can prevent a vulnerable to Local and Remote File Inclusion attacks.
You'll see it in an example where I load and validate the following string:
<!DOCTYPE scan [<!ENTITY test SYSTEM "php://filter/read=convert.base64-encode/resource=/etc/passwd">]>
<scan>&test;</scan>
One way to prevent that the file in given back is to set this value to 0.
Please take a closer look at the release of symfony 2.0.11
libxml_disable_entity_loader
(PHP 5 >= 5.2.11)
libxml_disable_entity_loader — Disable the ability to load external entities
Description
bool libxml_disable_entity_loader
([ bool
$disable = true
] )Disable/enable the ability to load external entities.
Parameters
Return Values
Returns the previous value.
See Also
- libxml_use_internal_errors() - Disable libxml errors and allow user to fetch error information as needed
- The
LIBXML_NONETconstant
simonsimcity ¶
1 year ago
