Remove Null Byte Check

This is not relevant anymore since we require PHP 5.4
remotes/origin/log-external-deletes
Lukas Reschke 10 years ago
parent 76c511de92
commit 20d57c8bfe
  1. 5
      core/setup/controller.php
  2. 7
      core/templates/installation.php

@ -131,10 +131,6 @@ class Controller {
$databases = $setup->getSupportedDatabases();
$dataDir = $this->config->getSystemValue('datadirectory', \OC::$SERVERROOT.'/data');
$vulnerableToNullByte = false;
if(@file_exists(__FILE__."\0Nullbyte")) { // Check if the used PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243)
$vulnerableToNullByte = true;
}
$errors = array();
@ -200,7 +196,6 @@ class Controller {
'databases' => $databases,
'directory' => $dataDir,
'htaccessWorking' => $htAccessWorking,
'vulnerableToNullByte' => $vulnerableToNullByte,
'errors' => $errors,
);
}

@ -26,13 +26,6 @@ script('core', [
<?php endforeach; ?>
</fieldset>
<?php endif; ?>
<?php if($_['vulnerableToNullByte']): ?>
<fieldset class="warning">
<legend><strong><?php p($l->t('Security Warning'));?></strong></legend>
<p><?php p($l->t('Your PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243)'));?><br/>
<?php p($l->t('Please update your PHP installation to use %s securely.', $theme->getName() )); ?></p>
</fieldset>
<?php endif; ?>
<?php if(!$_['htaccessWorking']): ?>
<fieldset class="warning">
<legend><strong><?php p($l->t('Security Warning'));?></strong></legend>

Loading…
Cancel
Save