SA Bugzilla – Bug 6358
Configuration options from file now tainted
Last modified: 2019-07-31 04:49:23 UTC
Hello there, opening this in bugzilla to discuss here (as discussed via mail before): Since SA 3.3.0, SA seems to consider variables that are read from configuration files as tainted, even if they are read through the normal SA configuration parser API. I don't really see the point for this because these options are meant to be controlled by the user (explicitly), that's why they are in a configuration file. In my case, these are even controlled only by the system administrator. Furthermore, the SA parser already performs checks on these values based on that is specified in the parser options. Unfortunately, this change hasn't even been listed in the ChangeLog (apologies if it is listed and I just haven't seen it yet), so I don't fully know yet when something is considered tainted and when not. What is the preferred way/recommendation of the devs here? As a short fix, I untainted all configuration values again after the parser has finished. Cheers, Chris
Can you mention a real-world problem this causes, please?
Although this bug is ancient and I don't maintain the plugin anymore, this caused plugins to malfunction if they did not explicitly untaint configuration values that the SA config parser gave them.
Closing old stale bug. Anything read from outside is tainted, and should be assumed hostile unless verified otherwise. Users and even update channels can be malicious.