Edit report at https://bugs.php.net/bug.php?id=63965&edit=1
ID: 63965 Comment by: 63965 dot phpbug at tomvalentine dot net Reported by: markku dot niskanen at gmail dot com Summary: php-fpm site-specific settings go global Status: Assigned Type: Bug Package: FPM related Operating System: Centos 6.2 PHP Version: 5.3.20 Assigned To: fat Block user comment: N Private report: N New Comment: The problem with this is that when setting a value through fastcgi_param PHP_ADMIN_VAlUE (or PHP_VALUE) is that when php-fpm receives this value it is applied only to the child process that receives the request. E.g. you have a pool of 5 processes, only one of thoses processes gets the value when the request is passed to it. When the child process is restarted (after max requests or max time) it loses the PHP_ADMIN_VALUE. The side effect of this is some unpredictability as by requesting info.php from another server block, depending on which child process serves out info.php, you may get different results. PHP-FPM also has rubbish security as any FCGI client can pass requests to it by default. E.g. nginx, php/python/perl scripts You can sometimes limit who can access the php-fpm server by: - If running as a unix domain socket, set listen.owner & listen.group to the user and group of the webserver which will not work if php-fpm and webserver are running as the same user and group. And set listen.mode to 0600 so that only the specified user can connect to it (renders listen.group pointless) However from fpm.conf "Many BSD-derived systems allow connections regardless of permissions." - If php-fpm is listening as a TCP server then you have to use a firewall to limit the connections between FCGI client and PHP-FPM (even if it is through localhost) Other similar bugs: 53611 & 54309 Previous Comments: ------------------------------------------------------------------------ [2013-04-19 10:42:54] steven dot hartland at multiplay dot co dot uk This is a very nasty security risk, with settings applied to trusted hosts being leaked to other vhosts. It essentially means that if PHP_VALUE or PHP_ADMIN_VALUE is used then every value set must then be explicitly set for every vhost otherwise the settings leak. This will also cause random behaviour dependent on request order. This should be reclassified as security and FPM module ------------------------------------------------------------------------ [2013-01-11 10:41:43] markku dot niskanen at gmail dot com The setup code got broken during upload but you should get the idea. ------------------------------------------------------------------------ [2013-01-11 10:40:26] markku dot niskanen at gmail dot com Description: ------------ # this is an nginx configuration for *.thiscustomer.com # it should ONLY affect *.thiscustomer.com, no other domains server { server_name .thiscustomer.com; #... normal stuff removed ... location ~ \.php$ { # now set for THIS site fastcgi_param PHP_VALUE "auto_prepend_file=/home/thiscustomer/lib/modules/ThisModule.class.php"; # ..other normal stuff from this on... } } Test script: --------------- Now first simply go any other site, say "www.thatcustomer.com" on the same server and everything works fine. Then go to "www.thiscustomer.com" (the example site) and everything works fine. Then again go to "www.thatcustomer.com" and you will see that you will have an "open_basedir restriction", PHP trying to load file (prepending) /home/thiscustomer/lib/modules/ThisModule.class.php So the auto_prepend_file value is changed GLOBALLY and permanently until some other domain changes it again. The same goes for ANY PHP_VALUE or PHP_ADMIN_VALUE but this is the one that will definitely break all sites. Tested in PHP 5.3.19 and 5.3.20, two different servers, two different operating systems (Centos 5.8 and Centos 6.2). ------------------------------------------------------------------------ -- Edit this bug report at https://bugs.php.net/bug.php?id=63965&edit=1