PHP 'zero-day' hole found

By
Follow google news

Bugged patch fails to fix flaw.

A dangerous vulnerability has been discovered in PHP-CGI which grants attackers remote code execution and the ability to steal source code.

PHP 'zero-day' hole found

The hole was publicly disclosed reportedly in error to Reddit following a patch issued by PHP Group, but the fix was later discovered by researcher Steffan Esser to have failed.

Researchers from Dutch security firm De Eindbazen discovered the vulnerability during a capture-the-flag event at the Nullcon event last year.

 

 

A workaround fix on which the failed patches (PHP versions 5.3.12 and 5.4.2) were based was posted to De Eindbbazen's web site which included technical details on the flaw.

Researchers warned that users not follow “homebrew” fixes posted in online comments about the flaw.

The flaw affected classic CGI servers and was centred on a query string that issued a “-s” command argument pushed to PHP. It had existed since 2004, researchers said.

The research firm recommended users use a wrapper binary around the php-cgi binary until a permanent fix is released.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Australian chief at US defence contractor L3Harris sold exploits to Russia

Australian chief at US defence contractor L3Harris sold exploits to Russia

Vic gov agencies flying blind on server security, audit finds

Vic gov agencies flying blind on server security, audit finds

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Log In

  |  Forgot your password?