1--TEST--
2Bug #69646 OS command injection vulnerability in escapeshellarg()
3--SKIPIF--
4<?php
5if( substr(PHP_OS, 0, 3) != "WIN" )
6  die("skip.. Windows only");
7?>
8--FILE--
9<?php
10
11$a = 'a\\';
12$b = 'b -c d\\';
13var_dump( $a, escapeshellarg($a) );
14var_dump( $b, escapeshellarg($b) );
15
16$helper_script = <<<SCRIPT
17<?php
18
19print( "--- ARG INFO ---\n" );
20var_dump( \$argv );
21
22SCRIPT;
23
24$script = __DIR__ . DIRECTORY_SEPARATOR . "arginfo.php";
25file_put_contents($script, $helper_script);
26
27$cmd = getenv('TEST_PHP_EXECUTABLE_ESCAPED') . " " . escapeshellarg($script) . " "  . escapeshellarg($a) . " " . escapeshellarg($b);
28
29system($cmd);
30
31unlink($script);
32?>
33--EXPECTF--
34string(2) "a\"
35string(5) ""a\\""
36string(7) "b -c d\"
37string(10) ""b -c d\\""
38--- ARG INFO ---
39array(3) {
40  [0]=>
41  string(%d) "%sarginfo.php"
42  [1]=>
43  string(2) "a\"
44  [2]=>
45  string(7) "b -c d\"
46}
47