This isn't a hacking board, if you want to break the law, learn how to
do it somewhere else.

Adam Voigt
[EMAIL PROTECTED]

On Tue, 2002-07-23 at 10:49, Anil Garg wrote:
> Hi,
> 
> I am not an expert in php but i would like to know how is the vulnerability
> exploited.
> 
> hope to get the right directions
> regards
> anil
> 
> >    PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and 4.2.1
> >
> >
> > Issued on: July 22, 2002
> > Software:  PHP versions 4.2.0 and 4.2.1
> > Platforms: All
> >
> >
> >    The PHP Group has learned of a serious security vulnerability in PHP
> >    versions 4.2.0 and 4.2.1. An intruder may be able to execute arbitrary
> >    code with the privileges of the web server. This vulnerability may be
> >    exploited to compromise the web server and, under certain conditions,
> >    to gain privileged access.
> >
> >
> > Description
> >
> >    PHP contains code for intelligently parsing the headers of HTTP POST
> >    requests. The code is used to differentiate between variables and files
> >    sent by the user agent in a "multipart/form-data" request. This parser
> >    has insufficient input checking, leading to the vulnerability.
> >
> >    The vulnerability is exploitable by anyone who can send HTTP POST
> >    requests to an affected web server. Both local and remote users, even
> >    from behind firewalls, may be able to gain privileged access.
> >
> >
> > Impact
> >
> >    Both local and remote users may exploit this vulnerability to
> compromise
> >    the web server and, under certain conditions, to gain privileged
> access.
> >    So far only the IA32 platform has been verified to be safe from the
> >    execution of arbitrary code. The vulnerability can still be used on
> IA32
> >    to crash PHP and, in most cases, the web server.
> >
> >
> > Solution
> >
> >    The PHP Group has released a new PHP version, 4.2.2, which incorporates
> >    a fix for the vulnerability. All users of affected PHP versions are
> >    encouraged to upgrade to this latest version. The downloads web site at
> >
> >       http://www.php.net/downloads.php
> >
> >    has the new 4.2.2 source tarballs, Windows binaries and source patches
> >    from 4.2.0 and 4.2.1 available for download.
> >
> >
> > Workaround
> >
> >    If the PHP applications on an affected web server do not rely on HTTP
> >    POST input from user agents, it is often possible to deny POST requests
> >    on the web server.
> >
> >    In the Apache web server, for example, this is possible with the
> >    following code included in the main configuration file or a top-level
> >    .htaccess file:
> >
> >       <Limit POST>
> >           Order deny,allow
> >           Deny from all
> >       </Limit>
> >
> >    Note that an existing configuration and/or .htaccess file may have
> >    parameters contradicting the example given above.
> >
> >
> > Credits
> >
> >    The PHP Group would like to thank Stefan Esser of e-matters GmbH for
> >    discovering this vulnerability.
> >
> >
> > Copyright (c) 2002 The PHP Group.
> >
> >
> >
> > --
> > PHP Announcements Mailing List (http://www.php.net/)
> > To unsubscribe, visit: http://www.php.net/unsub.php
> >
> 
> 
> -- 
> PHP Development Mailing List <http://www.php.net/>
> To unsubscribe, visit: http://www.php.net/unsub.php
> 



-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to