Seriously, how incompetent do you have to be to not only write code like this, but also *once the bug is found, completely fail at educating yourself as to what the correct, sane, safe way to fix it is*? I might excuse lack of knowledge, but not the utter inability to learn.
-
Show this thread
-
Seriously, this incident raises *serious* questions about the quality of development at
@yubico. It might be an isolated problem, but how did this mess slip through the cracks? Who reviewed this code? Does an entire team at Yubico think this is okay? Who hired them?1 reply 7 retweets 84 likesShow this thread -
Do the same standards apply to every other team at
@yubico? How do we know this isn't a pervasive problem? Are there any companywide standards on code quality? Is there even a security team dedicated to auditing stuff in general? HOW DID THIS HAPPEN?!?3 replies 2 retweets 61 likesShow this thread -
Hector Martin Retweeted Hector Martin
Btw, someone joked about http://php.net having this as the correct solution, and, well. But "knowing better than http://php.net " is definitely a prerequisite to be in the security business writing PHP. Or just don't write PHP.https://twitter.com/marcan42/status/1089238169839489025 …
Hector Martin added,
Hector Martin @marcan42It's 2019 and PHP is *still* teaching people to concatenate SQL and vaguely-sanitized user input instead of using prepared statements. http://php.net/manual/en/mysqli.examples-basic.php … They got rid of the mysql module... only to teach people to use mysqli the same way. This is why SQLi isn't going away.3 replies 8 retweets 105 likesShow this thread -
OMG IT'S STILL BROKEN. THIS IS HOW THEY'RE SANITIZING URLS FOR INSERTING INTO SQL QUERIES $ echo "<?php echo filter_var('http://inject/\'', FILTER_VALIDATE_URL);" | php http://inject/' AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
8 replies 26 retweets 144 likesShow this thread -
Replying to @marcan42
Your tweets are quite toxic. The attitude displyed in this thread is the reason why we cannot have a possitive and open relationship with vendors.
4 replies 0 retweets 7 likes -
Replying to @Kuggofficial
There is a minimum set of expectations from vendors, which was thoroughly violated here. I'm all for positivity, especially when it comes to teaching security to those who are not in the industry... But if you *sell security* and do this, there is no excuse.
1 reply 3 retweets 22 likes -
Replying to @marcan42 @Kuggofficial
Alternatively: I have *no idea* how one could possibly ever handle this in a positive way. I get the problems with negativity... but the only option I see here is to just stop being in this field altogether.
1 reply 0 retweets 1 like -
Replying to @marcan42 @Kuggofficial
(Which I *have* considered, because believe me, I don't derive joy from ranting on security fails like this... but what am I supposed to do otherwise?)
1 reply 0 retweets 2 likes -
Replying to @marcan42
I believe you. Those commits are dangerous. The problem is that toxic language on code quality (or any art) leads to unskilled developers hiding mistakes instead of sharing them. Code like this exist in many security products. The bar must be raised. Particulary in legacy php
1 reply 0 retweets 1 like
The concerning issue is that there apparently are 6 unskilled PHP developers at Yubico who couldn't figure out that this is a bad idea. It's a security firm's responsibility to ensure it has processes (hiring, code review, etc) that ensure quality.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.