-
Notifications
You must be signed in to change notification settings - Fork 821
Comments: Catch PHP errors when malformed POST is submitted #43832
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Are you an Automattician? Please test your changes on all WordPress.com environments to help mitigate accidental explosions.
Interested in more tips and information?
|
Thank you for your PR! When contributing to Jetpack, we have a few suggestions that can help us test and review your patch:
This comment will be updated as you work on your PR and make changes. If you think that some of those checks are not needed for your PR, please explain why you think so. Thanks for cooperation 🤖 Follow this PR Review Process:
If you have questions about anything, reach out in #jetpack-developers for guidance! Jetpack plugin: The Jetpack plugin has different release cadences depending on the platform:
If you have any questions about the release process, please ask in the #jetpack-releases channel on Slack. |
Code Coverage SummaryThis PR did not change code coverage! That could be good or bad, depending on the situation. Everything covered before, and still is? Great! Nothing was covered before? Not so great. 🤷 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems reasonable enough.
Probably it's some fuzz tester or other script submitting like &field[]=value
trying to see if they can find a security bug. To really deal with this sort of thing effectively, we'd probably need some sort of accessor function or class instead of accessing $_GET
and $_POST
directly everywhere. But accessing $_GET
and $_POST
directly is the WordPress Way, so extra random checks it is 🤷.
I saw these errors in the WP Cloud logs:
The method is triggered by the
pre_comment_on_post
action. As we know, anything can happen in actions, so I'm not sure if$POST
was manipulated somewhere there or by some other thing that sent bad data, but this PR adds twois_string()
checks to prevent the fatal.Proposed changes:
Other information:
Jetpack product discussion
Does this pull request change what data or activity we track or use?
Testing instructions:
I'm not sure the best way to reproduce this. 🤷