>> I read about this vulnerability in the
>> 2015-04-06-apache-addhandler-addtype Gentoo news item.  I don't think
>> I'm using any functionality that could expose me to the problem but
>> I'd like to be able to say so for sure.  Does the fact that I'm
>> up-to-date with GLSAs, I don't have PHP5 in APACHE2_OPTS (I use
>> php-fpm), along with the following (which I think is default) indicate
>> that I'm not vulnerable?
>
> (1) Do you allow untrusted people to upload files to your server?
>
> (2) If so, do you try to prevent them from uploading PHP files
>     based on a regular expression or shell glob?
>
> Unless you answer "yes" to both of those questions, you don't need to
> check anything.
>
> The vulnerability is that with,
>
>   AddHandler application/x-httpd-php .php
>
> Apache will go ahead and try to execute (for example) foo.php.html. If
> you're blocking uploads of *.php to prevent people from uploading PHP
> scripts, then I could name my file foo.php.html and bypass your restriction.
>
> The AddHandler behavior was documented, but incredibly unexpected -- and
> we had it in the default configuration. The new config we ship uses,
>
>   <FilesMatch "\.php$">
>     SetHandler application/x-httpd-php
>   </FilesMatch>
>
> instead so only *.php files get executed.


Thank you Michael.

- Grant

Reply via email to