All,
These days a serious security vulnerability has been discovered in PHP, all versions since 8 years ago. The vulnerability has nothing to do with SMF and cannot be addressed by us, because the forum code doesn't even get to be executed. It can only be patched or mitigated at server level. However, we are bringing it to your attention because it's critical (remote code execution), for you to make sure to test if your site is affected (hopefully not), and if necessary, notify your host and try to mitigate it.
The issue is reported on a very particular configuration, PHP ran as CGI script (not FCGI), on Apache, rather unusual these days. If your host is running it, however, then it is possible that arbitrary code can be executed, compromising your sites. This does NOT apply to the most common PHP setups these days (PHP ran by mod_php, or fast-cgi are NOT affected), so it is possible you may not be affected. We would advise however, to test if your site is vulnerable, and take measures in that case.
How to test if your sites are vulnerable: (please see this link (http://www.php.net/archive/2012.php#id2012-05-03-1))
Add ?-s at the end of any URL of a PHP script, like: yoursite/index.php?-s
If you see PHP code, your PHP is vulnerable.
If you see your page normally, your site is not affected.
How to mitigate the issue:
If your site is affected, and you may have mod_rewrite available and enabled in Apache, then please add to .htaccess the rewrite rule:
RewriteEngine on
RewriteCond %{QUERY_STRING} ^[^=]*$
RewriteCond %{QUERY_STRING} %2d|\- [NC]
RewriteRule .? - [F,L]
Also, if you can verify the issue is happening for your site, please do notify your host immediately, including a link to the issue.
They can make sure to either (or all): change their configuration, apply the .htaccess patch to all sites, and, when the PHP issue will be fixed, to upgrade their PHP installation.
Please find here the current (already outdated) official report from PHP:
http://www.php.net/archive/2012.php#id2012-05-03-1
Note in addition, that the new versions released at the time of this post are still vulnerable, the release of PHP 5.3.12 and 5.4.2 has been rushed by the accidental disclosure of the bug report they were working on, and the patch is still faulty. The code committed to Github for PHP 5.3.12 is clearly buggy, and I'd expect PHP to release another patch anytime now. When they do, it is highly recommended that servers running this kind of configuration upgrade their PHP or change this configuration altogether.
Thanks for informing us.
Thank you for the notice :)
If you are running a cPanel server this issue was fixed more then two years ago:
http://forums.cpanel.net/f185/php-5-3-12-security-vulnerability-patch-275011.html
Seems like Facebook may have some issues sooner or later..
Thanks for informing.
Thanks for the warning!
Quote from: Yoshi2889 on May 05, 2012, 05:49:58 PM
Seems like Facebook may have some issues sooner or later..
Thanks for informing.
Or not seeing how they actually don't run standard PHP but compiled PHP and in fact going to a certain URL to attempt to exploit this will suggest you visit their hiring pages.
Quote from: Arantor on May 05, 2012, 06:16:46 PM
Quote from: Yoshi2889 on May 05, 2012, 05:49:58 PM
Seems like Facebook may have some issues sooner or later..
Thanks for informing.
Or not seeing how they actually don't run standard PHP but compiled PHP and in fact going to a certain URL to attempt to exploit this will suggest you visit their hiring pages.
Still, who knows what this exploit may do. I'm not an expert in PHP security, so what do I know..
Only those using CGI (not even fastcgi) are affected and it seems to mainly be pointed out on Apaches systems. If its patched in cPanel, also that helps. So the scope of the attack is small. But that won't stop new bot scripts from trying something new now.
But its important for people to know incase they are vulnerable to this.
Yoshi, I think Facebook were joking. (this time). Obviously these days sites have started to get hits for that query string.
Actually, we could do something too, Sleepy. ;)
Quote from: N. N. on May 05, 2012, 06:49:44 PM
Yoshi, I think Facebook were joking. (this time).
Yay, great joke at a great time.[/sarcasm]
Norv, you mean:
if ($args ~ ^\+?(%2d|-)[^=]+$)
{
return 402;
}
For my site: http://www.bbiclan.com/forum/index.php?%20-s, I see everything until the bottom of the shout-box which is just below the ribbon. Am I vulnerable?
Quote from: TheMortician4 on May 05, 2012, 07:31:24 PM
For my site: http://www.bbiclan.com/forum/index.php?%20-s, I see everything until the bottom of the shout-box which is just below the ribbon. Am I vulnerable?
No, you aren't vurnerable.
http://www.bbiclan.com/forum/index.php?-s
doesn't return the source code.
Quote from: Yoshi2889 on May 05, 2012, 07:33:03 PM
Quote from: TheMortician4 on May 05, 2012, 07:31:24 PM
For my site: http://www.bbiclan.com/forum/index.php?%20-s, I see everything until the bottom of the shout-box which is just below the ribbon. Am I vulnerable?
No, you aren't vurnerable.
http://www.bbiclan.com/forum/index.php?-s
doesn't return the source code.
Awesome thank you for responding so quickly...!!!!
Awesome thank you
just saw similar threads on another forum, and just test my server, its SAVE, nice
Thanks!
Thanks for notifying :)
Thanks for the heads-up! Luckily, both hosts I use seem to be safe from this vulnerability.
Quote from: Sverre on May 08, 2012, 07:59:40 AM
Thanks for the heads-up! Luckily, both hosts I use seem to be safe from this vulnerability.
Yeah, i just checked all my sites on different hosts and all appear safe. No source code revealed. I'm relieved to know it's not such a widespread issue.
PHP 5.4.3 and PHP 5.3.13 Released (http://www.php.net/archive/2012.php#id2012-05-08-1) :)