Am Wednesday, 1. September 2004 14:24 schrieb Marcin Owsiany:
> Check whether the index.php looks like something that was created by
> the attacker, or it is just a legitimate but buggy script file.

It is a normal index.php File from a legitimate user. It seems to be 
programmed poorly, because it doesn't check the contents of variable 
that's beeing passed as a parameter to the script itself.

> > How can I genereally close this hole for now? I guess there is a
> > setting in php.ini or so. I will take a look at it.
>
> Probably there is a setting for this very feature that facilitated
> this exploitation (HTTP-enabled open() I guess). But there are two
> problems with that: new security implications of certain PHP features
> are discovered rather regularily, and many users depend on such
> features.

The russian website from which the link I have posted mentions a php.ini 
setting "allow_url_fopen". We did some testing and it worked to prevent 
the loading of external urls. But I am not sure if this setting can stop 
that hack from happening. We'll see. :)

> Actually allowing not-very-experienced programmers to run arbitrary
> code on your machine is the more general problem we are facing, for
> which there is no easy solution.
>
> My current plan is to run PHP via suexec, so that I can easily find out
> which user's website was cracked. Then I would shut down the particular
> web page and tell the client to either fix it or say goodbye ]:->
>
> Unfortunately I hear that there are some PHP features (something having
> to do with authentication) which don't work when PHP is not run as an
> Apache module, so I cannot migrate all users in a batch. Generally, PHP
> is a little bit like a nightmare for me :-)

This is so right. I will sooner or later also take some measures, 
gr-security and/or a chroot environment for apache.

Thank to everyone who answered me. I will be prepared if it happens again 
and will try to record more info to provide it.

Kind regards

Timo


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to