GLSA 200402-01: PHP setting leaks from .htaccess files on virtual hosts
Severity: | normal |
Title: | PHP setting leaks from .htaccess files on virtual hosts |
Date: | 02/07/2004 |
Bugs: |
|
ID: | 200402-01 |
Synopsis
If the server configuration "php.ini" file has "register_globals = on" and a request is made to one virtual host (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) global variables may leak and may be used to exploit the site.Background
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
dev-php/mod_php | < 4.3.4-r4 | >= 4.3.4-r4 | All supported architectures |
Description
If the server configuration "php.ini" file has "register_globals = on" and a request is made to one virtual host (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) through the same apache child, the setting will persist.
Impact
Depending on the server and site, an attacker may be able to exploit global variables to gain access to reserved areas, such as MySQL passwords, or this vulnerability may simply cause a lack of functionality. As a result, users are urged to upgrade their PHP installations.
Gentoo ships PHP with "register_globals" set to "off" by default.
This issue affects both servers running Apache 1.x and servers running Apache 2.x.
Workaround
No immediate workaround is available; a software upgrade is required.
Resolution
All users are recommended to upgrade their PHP installation to 4.3.4-r4:
# emerge sync # emerge -pv ">=dev-php/mod_php-4.3.4-r4" # emerge ">=dev-php/mod_php-4.3.4-r4"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.