GLSA 200402-01: PHP setting leaks from .htaccess files on virtual hosts

Severity:normal
Title:PHP setting leaks from .htaccess files on virtual hosts
Date:02/07/2004
Bugs: #39952
ID:200402-01

Synopsis

If the server configuration "php.ini" file has "register_globals = on" and a request is made to one virtual host (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) global variables may leak and may be used to exploit the site.

Background

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

Affected packages

Package Vulnerable Unaffected Architecture(s)
dev-php/mod_php < 4.3.4-r4 >= 4.3.4-r4 All supported architectures

Description

If the server configuration "php.ini" file has "register_globals = on" and a request is made to one virtual host (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) through the same apache child, the setting will persist.

Impact

Depending on the server and site, an attacker may be able to exploit global variables to gain access to reserved areas, such as MySQL passwords, or this vulnerability may simply cause a lack of functionality. As a result, users are urged to upgrade their PHP installations.

Gentoo ships PHP with "register_globals" set to "off" by default.

This issue affects both servers running Apache 1.x and servers running Apache 2.x.

Workaround

No immediate workaround is available; a software upgrade is required.

Resolution

All users are recommended to upgrade their PHP installation to 4.3.4-r4:

    # emerge sync
    # emerge -pv ">=dev-php/mod_php-4.3.4-r4"
    # emerge ">=dev-php/mod_php-4.3.4-r4"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200402-01.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!