[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200603291536.k2TFa5aV009066@turing-police.cc.vt.edu>
Date: Wed Mar 29 16:36:14 2006
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Critical PHP bug - act ASAP if you are running
web with sensitive data
On Wed, 29 Mar 2006 02:40:49 CST, nocfed said:
> Right, that is a vector that nobody knows about unless they have
> common sense. There were previous bugs with text editor(s) which used
> logfiles to push the payload. Why someone would ever decide to
> include parsable logfiles directly into a script is beyond me, and I'm
> sure is even beyond the kid that has been tinkering around the crap
> known as php, a god awful scripting language, for but a single day.
You're almost, but not quite right - the crucial point you slid right past is
that it's "nobody knows about unless they have common sense *and* *a* *reason*
*to* *be* *security* *conscious*".
It's a subtle point that those *in* the security industry have a hard time
remembering. Things like SQL injections happen because the guy who wrote the
code and forgot to sanitize the input string is in a certain mindset at the
time.
He is *not* thinking "I better be careful that some hacker from whatever
they're calling Yugoslavia this decade doesn't get in". He's thinking "the
boss wants this new web reporting system working by next Friday". So he never
tests whether the page blows up if it sees apostrophe semicolon more SQL
statements, because what's *supposed* to be in that field is a phone number,
and phone numbers never have apostrophes. And he's too busy worrying about
things like "some people enter 555 1212 and some enter 555-1212 and some enter
212-555-1212 and some enter +1 (212) 555-1212 and there's one guy in the Hong
Kong office that killed the *last* system when he put in some string that
didn't have 7, 10, or 11 numeric digits, it was like 15, and all of it has to
be converted to one format for the database...."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060329/13ba5b82/attachment.bin
Powered by blists - more mailing lists