ID:               46804
 Updated by:       [EMAIL PROTECTED]
 Reported By:      deminy at deminy dot net
-Status:           Open
+Status:           Bogus
 Bug Type:         Filesystem function related
 Operating System: Ubuntu
 PHP Version:      5.2.8
 New Comment:

Unfortunately obvious coding errors are not PHP bugs. Never ever trust
any input without filtering it. 


Previous Comments:
------------------------------------------------------------------------

[2008-12-09 08:25:13] deminy at deminy dot net

'allow_url_include' has nothing to do with the bug I mentioned. The bug
was not introduced because of including a URL using include/require
constructs.

------------------------------------------------------------------------

[2008-12-09 04:43:12] crrodriguez at opensuse dot org

There is extensive literature out there about this, please do your
homework before opening bug reports.

ps: use allow_url_include=off to prevent this problem, which is
fundamentally a problem in **your code**.

------------------------------------------------------------------------

[2008-12-09 00:57:54] deminy at deminy dot net

Description:
------------
One of my web hosts was hacked some time ago. After checking access_log
and made some research online, I think it was caused by a security bug
in PHP, which may cause some PHP open source programs vulnerable.

If a PHP program include a file whose file name is based on user
request data (e.g., "include($_REQUEST['lang'] . 'inc.php';"), and
'/proc/self/environ' is (accidentally) readable by Apache user on
Unix/Linux server, the server is probably vulnerable.

Posting related HTTP access log and sample code here may be a threaten
to sites built on some PHP open source programs. Please send me an email
to request details. Thanks.



------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=46804&edit=1

Reply via email to