Edit report at https://bugs.php.net/bug.php?id=63965&edit=1

 ID:                 63965
 Comment by:         63965 dot phpbug at tomvalentine dot net
 Reported by:        markku dot niskanen at gmail dot com
 Summary:            php-fpm site-specific settings go global
 Status:             Assigned
 Type:               Bug
 Package:            FPM related
 Operating System:   Centos 6.2
 PHP Version:        5.3.20
 Assigned To:        fat
 Block user comment: N
 Private report:     N

 New Comment:

The problem with this is that when setting a value through fastcgi_param 
PHP_ADMIN_VAlUE (or PHP_VALUE) is that when php-fpm receives this value it is 
applied only to the child process that receives the request.

E.g. you have a pool of 5 processes, only one of thoses processes gets the 
value when the request is passed to it. When the child process is restarted 
(after max requests or max time) it loses the PHP_ADMIN_VALUE.

The side effect of this is some unpredictability as by requesting info.php from 
another server block, depending on which child process serves out info.php, you 
may get different results.

PHP-FPM also has rubbish security as any FCGI client can pass requests to it by 
default. E.g. nginx, php/python/perl scripts

You can sometimes limit who can access the php-fpm server by:
- If running as a unix domain socket, set listen.owner & listen.group to the 
user and group of the webserver which will not work if php-fpm and webserver 
are running as the same user and group. And set listen.mode to 0600 so that 
only the specified user can connect to it (renders listen.group pointless)

However from fpm.conf "Many BSD-derived systems allow connections regardless of 
permissions."

- If php-fpm is listening as a TCP server then you have to use a firewall to 
limit the connections between FCGI client and PHP-FPM (even if it is through 
localhost)

Other similar bugs: 53611 & 54309


Previous Comments:
------------------------------------------------------------------------
[2013-04-19 10:42:54] steven dot hartland at multiplay dot co dot uk

This is a very nasty security risk, with settings applied to trusted hosts 
being 
leaked to other vhosts.

It essentially means that if PHP_VALUE or PHP_ADMIN_VALUE is used then every 
value 
set must then be explicitly set for every vhost otherwise the settings leak.

This will also cause random behaviour dependent on request order.

This should be reclassified as security and FPM module

------------------------------------------------------------------------
[2013-01-11 10:41:43] markku dot niskanen at gmail dot com

The setup code got broken during upload but you should get the idea.

------------------------------------------------------------------------
[2013-01-11 10:40:26] markku dot niskanen at gmail dot com

Description:
------------
# this is an nginx configuration for *.thiscustomer.com
# it should ONLY affect *.thiscustomer.com, no other domains
server {
server_name .thiscustomer.com;
#... normal stuff removed ...
location ~ \.php$ {
# now set  for THIS site
fastcgi_param PHP_VALUE 
"auto_prepend_file=/home/thiscustomer/lib/modules/ThisModule.class.php";
# ..other normal stuff from this on...
}
}


Test script:
---------------
Now first simply go any other site, say "www.thatcustomer.com" on the same 
server and everything works fine. 

Then go to "www.thiscustomer.com" (the example site) and everything works fine.

Then again go to "www.thatcustomer.com" and you will see that you will have an 
"open_basedir restriction", PHP trying to load file (prepending) 
/home/thiscustomer/lib/modules/ThisModule.class.php

So the auto_prepend_file value is changed GLOBALLY and permanently until some 
other domain changes it again. The same goes for ANY PHP_VALUE or 
PHP_ADMIN_VALUE but this is the one that will definitely break all sites.

Tested in PHP 5.3.19 and 5.3.20, two different servers, two different operating 
systems (Centos 5.8 and Centos 6.2).



------------------------------------------------------------------------



-- 
Edit this bug report at https://bugs.php.net/bug.php?id=63965&edit=1

Reply via email to