I don't know how many of you on this list are also on Bugtraq, but there
were some *very* interesting posts there this morning by Shaun Clowes.  You
can see them at:

http://www.securereality.com.au/archives.html

The relevant links to look at are "A Study in Scarlet":
http://www.securereality.com.au/studyinscarlet.txt

And:

(SRPRE00001) phpMyAdmin 2.1.0 and phpPgAdmin 2.2.1
http://www.securereality.com.au/srpre00001.html

I imagine that many on this list do use phpMyAdmin or phpPgAdmin so this
post is very important.

Basically, depending on configuration, any user on the web can use
phpMyAdmin to view sensitive files (/etc/passwd), etc.  There is a patch
available.

The Study in Scarlet goes into details about other common PHP security
breaches, and a little about how to avoid them.  The problems aren't *so*
bad if you're running your own server and access is only given to a few
trusted developers.  You could probably retrain everyone to use
$HTTP_GET_VARS, etc.

However, there could be a multitude of problems on hosts with multiple
virtual users.  For example, the above exploit could be used to get a list
of the users and home directories in /etc/passwd and then a malicious user
could view directory listings and file contents from another user's
directory.  That could lead to database passwords escaping and other local
users modifying your data.  And that's only the tip of the iceberg.

I look forward to seeing Rasmus, Andi, Zeev, Stig etc. respond to this.

Sincerely,

Paul Burney

+-------------------------+---------------------------------+
| Paul Burney             | P: 310.825.8365                 |
| Webmaster && Programmer | E: <[EMAIL PROTECTED]>   |
| UCLA -> GSE&IS -> ETU   | W: <http://www.gseis.ucla.edu/> |
+-------------------------+---------------------------------+


-- 
PHP Database Mailing List (http://www.php.net/)
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to