An important PHP security update
If you are using Apache mod_cgi to run PHP you may be vulnerable. To see if you are just add ?-s to the end of any of your URLs. If you see your source code, you are vulnerable. If your site renders normally, you are not."
Posted May 3, 2012 21:52 UTC (Thu)
by abadidea (guest, #62082)
[Link] (1 responses)
Posted May 3, 2012 23:57 UTC (Thu)
by rvolgers (guest, #63218)
[Link]
The current PHP patch (which is in the newly released PHP updates) has the following line:
+ if(*decoded_query_string == '-' && strchr(decoded_query_string, '=') == NULL) {
The second decoded_query_string should just be query_string. The current fix can be bypassed by having a %3d sequence in your query string.
Posted May 4, 2012 1:03 UTC (Fri)
by jmayer (guest, #595)
[Link] (1 responses)
Posted May 4, 2012 17:59 UTC (Fri)
by drag (guest, #31333)
[Link]
A developer realized that the protection against this sort of attack was interfering with some of the regression tests so he deleted it. Nobody replied to his email explaining why the code check was needed.
Really bizarre stuff.
Posted May 4, 2012 1:20 UTC (Fri)
by xtifr (guest, #143)
[Link] (3 responses)
Posted May 4, 2012 2:14 UTC (Fri)
by cortana (subscriber, #24596)
[Link]
Posted May 4, 2012 2:29 UTC (Fri)
by jmayer (guest, #595)
[Link] (1 responses)
Posted May 4, 2012 23:49 UTC (Fri)
by branden (guest, #7029)
[Link]
Posted May 4, 2012 5:53 UTC (Fri)
by philipstorry (subscriber, #45926)
[Link]
Posted May 5, 2012 16:29 UTC (Sat)
by slashdot (guest, #22014)
[Link] (2 responses)
I just tested a ?-s query on something like 20-30 PHP sites randomly found via Google, and none were vulnerable.
Posted May 6, 2012 8:49 UTC (Sun)
by TRS-80 (guest, #1804)
[Link] (1 responses)
Posted May 6, 2012 14:19 UTC (Sun)
by anselm (subscriber, #2796)
[Link]
It seems that there are still people who didn't get that this is a little joke (hint: follow the link that is in the »source code« Facebook returns for that request).
Note that Facebook, on their live sites, uses the PHP language but not the standard PHP implementation. It is therefore highly unlikely that bugs in the stock PHP interpreter would impact them at all.
An important PHP security update
An important PHP security update
The people who brought you this beautiful feature also brought you
this.
Referenced here, which in turn
was referenced on lwn.
At least they are consistent
At least they are consistent
An important PHP security update
An important PHP security update
An important PHP security update
An important PHP security update
An important PHP security update
An important PHP security update
An important PHP security update
An important PHP security update