[php-maint] Re: php4 security issues, the complete works (vol 2)
sean finney
seanius at debian.org
Mon Sep 11 06:30:01 UTC 2006
hey stefan,
On Sun, 2006-09-10 at 17:42 +0200, Stefan Fritsch wrote:
> > *CVE-2006-0207: needs further research:
> > text:
> > Multiple HTTP response splitting vulnerabilities in PHP 5.1.1
> > allow remote attackers to inject arbitrary HTTP headers via a
> > crafted Set-Cookie header, related to the (1) session extension
> > (aka ext/session) and the (2) header function.
> >
> > background:
> > this bug was marked closed in the security tracker, but later it
> > was revealed that sarge might still be affected. see
> > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=354683
> > for more information.
>
> I have verified that the PoC in the bug report works with php4 from
> sarge. With firefox it can be used to do XSS (konqueror just gives an
> error message in this particular case). I think that such redirector
> scriptlets that feed a request parameter into a Location-header
> appear frequently in webapps. So I argue this should be fixed.
that seems pretty reasonable. i'll go digging for a patch.
> CVE-2005-3390 is register_globals=on only. It seems to be quite
> severe, though, so maybe it should be fixed nonetheless.
moritz seems to think otherwise, and i'm inclined to agree with him.
i'm not sure i understand the severity issue anyway, because i don't see
how being able to overwrite the $GLOBALS array is any different from
being able to overwrite any of the contents of the array, which is what
register_globals does.
> BTW, wouldn't it make sense to formalize the security policy for php
> (no register_globals, no safe_mode, no open_basedir) and put it into
> the php package descriptions, README.Debians, and php.ini-comments
> for etch?
yes, i agree. i'll make sure to have some notes in the next uploads
of php4/php5 about this. joey/moritz: i imagine that i should get you
guys to sign off on whatever that blurb says... how about:
Because of the large number of security-related problems with
certain PHP configurations, the Debian security team does not
provide security support for configurations known to be
inherently insecure. Most specifically, the security team will
not provide support for flaws in:
- vulnerabilities involving register_globals being activated,
unless specifically the vulnerability activates this setting
when it was configured as deactivated.
- vulnerabilities involving any kind of safe_mode or
open_basedir violation, as these are security models flawed
by design and no longer have upstream support either.
- any "works as expected" vulnerabilities, such as "user can
cause php to crash by writing a malcious php script", unless
such vulnerabilities involve some kind of higher-level DoS or
privilege escalation that would not otherwise be available.
- something else? something more specific about input
sanitizing problems?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: This is a digitally signed message part
Url : http://lists.alioth.debian.org/pipermail/pkg-php-maint/attachments/20060911/54bb967a/attachment.pgp
More information about the pkg-php-maint
mailing list