[wp-hackers] Security Vulnerability found - Forum Post

David Chait davebytes at comcast.net
Fri Apr 15 21:25:21 GMT 2005


yes, generally any apache/php request is a temporal, one-shot process, completely stateless.  Frankly, the entire web works that way.  'State' is introduced using things like sessions and cookies, and in more advanced applications sessions migrate to data stores, java applets can store state in javabeans that can even migrate between servers, etc.

the only truly persisting web apps would be connected java/etc. which open up a communication socket (TCP or otherwise) with a server and it remains open for an extended duration.  all other persistance on the web is otherwise 'artificial', using some kind of caching mechanism (cookie, sessions, to disk, in memory, to db server, etc.).  There's power and flexibility from that, in that you can scale lightweight sites to heavily redundant server farms with ease (heavier sites, with lots of session data get a bit more complex, usually requiring persisting the session state into a separate db server cluster on the back end...).

fun fun fun. ;)

-d
  ----- Original Message ----- 
  From: Amit Gupta 
  To: wp-hackers at lists.automattic.com 
  Sent: Friday, April 15, 2005 3:25 PM
  Subject: Re: [wp-hackers] Security Vulnerability found - Forum Post



  oh well!! I didn't know the variables & objects are destroyed after an HTTP Request is served!!


  -----
  Amit Gupta

  || Canned!! -- my Atropine || iG:Syntax Hiliter v2.01 ||
  || iGEEK.INFO || Free Nokia Ringtones || Online Gaming @ Games Planet || 




  ---------- Original Message from "David Chait" <davebytes at comcast.net> ----------
  the database is opened once, when the $wpdb object is instantiated.  unless plugins are manually accessing the db themselves (which
  they SHOULDN'T!), one connection is opened when a HTTP request comes in, and remains open only for the context of that request.  if by
  'page' you mean 'later included PHP file', that already occurs.  if by 'page' you meant 'next HTTP request', there's no persistance.
   
  -d




------------------------------------------------------------------------------


  _______________________________________________
  wp-hackers mailing list
  wp-hackers at lists.automattic.com
  http://lists.automattic.com/mailman/listinfo/wp-hackers
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://comox.textdrive.com/pipermail/wp-hackers/attachments/20050415/e97d87c6/attachment.html


More information about the wp-hackers mailing list