Sunday, November 18, 2018

PHP Security Vulnerability

The security agencies advise web hosting companies to disable blacklisted PHP functions which are abused by miscreants. On shared hosting, the companies provide separate accounts to their clients, so they don't interfere with adjacent systems of other users.

French web hacker Nicolas Grégoire reported the discovery of an (unnamed) large hosting provider which forgot to include proc_open() in the list of disabled PHP functions.

A Russian language-speaking security researcher nicknamed Twoster uncovered a mechanism to bypass these controls using an imap_open exploit. Security researcher Anton Lopanitsyn (AKA i_Bo0oM) publicized on a GitHub post. The exploit works on Debian, and Ubuntu versions of Linux and hacker creates a means to abuse functions that were previously thought to be safe to run arbitrary code execution-style attacks.

No comments:

Post a Comment