lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <442A1C30.6030106@jes.ee> Date: Wed Mar 29 08:16:35 2006 From: tonu at jes.ee (Tõnu Samuel) Subject: Critical PHP bug - act ASAP if you are running web with sensitive data Slythers Bro wrote: > <?php > $host = "127.0.0.1 <http://127.0.0.1>"; > $user = "sqluser"; > $pass = "sqlpass"; > > $foobar=html_entity_decode($_GET['foo']); > echo $foobar; > > ?> Situation is worse. I was able to see 1. Source code itself (may expose bugs in software) 2. Data from other threads. For exaxmple on busy web server I see pieces of HTML other users are seeing. Think if they are watching their private e-mails or use internet banking. What is good for attacker - this exploit does not crash server. Just "reload" and more data is coming. So try it on production server and you see how dangerous it might be. At least till now we got no crashing problems with it. T?nu