Concern Over PHP Attacks Affecting Major Websites

Hackers are trying in earnest to exploit weaknesses in PHP, the server-side code platform used by 80 percent of the world’s websites, including Facebook and Wikipedia, researchers have warned.

Security company Imperva is particularly concerned about two vulnerabilities that can be used to execute code on servers running PHP. The flaws mean a PHP application can fail to stop variables being modified by external sources.

Attackers are widely abusing SuperGlobal variables, which are predefined and can be coded in PHP applications without the need for declaration as in local and global variables, to execute code remotely.

PHP coders warned

One flaw lets an attacker craft a malicious query string that overrides values within the _SESSION SuperGlobal variable. Another is present in PHP’s session serialisation mechanism, which represents complex structured objects in a textual format so they can be stored in files.

When an attacker combines those flaws, an attacker can execute arbitrary code on a server running PhpMyAdmin, a database management application.

“The attacker can combine the two separate vulnerabilities, the former letting the attacker inject a value into the session, and the latter allowing the attacker to create arbitrary string to inject a maliciously crafted PMA_config object into the serialised session,” Imperva said in its report.

The ultimate aim is to take over a server running the PhpMyAdmin software.

The company used its honeypots and community data to do some analysis on attacks, finding that in May 2013, 3,450 requests manipulated PHP SuperGlobal variables. These were generated by 27 different source IP addresses targeting 24 web applications

“Most of these attacks were not limited to attacks on SuperGlobal parameters, but were part of a larger attack campaign,” Imperva added. “SuperGlobal manipulation has become common practice and has already been integrated into security and hacking tool routines.

“Based on the captured malicious traffic, we were able to trace its origin and find the specific exploit code used to generate it in a hackers’ forum on the web.”

If the code is doing the rounds on the dark web, businesses running PHP on their machines should be concerned and look for fixes.

What do you know about Internet security? Find out with our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago