News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Hardened-PHP Project:
Advisory - PHP open_basedir Race Condition Vulnerability
October 04, 2006 @ 09:10:00

The Hardened-PHP Project has released another vulnerability today, this time it's an issue with one of PHP's own internal functions - open_basedir.

The design of the open_basedir feature of PHP that is meant to disallow access to files outside a set of configured directories is vulnerable to race conditions.

It was discovered that this design flaw can be exploited with the usage of PHP's symlink() function in a very easy way. We believe that the only solution to this problem is disabling the function symlink() while open_basedir is used (this feature was therefore added to our Suhosin PHP Security Extension).

They also note, unfortunately, that the problem may not be fixable due to how it can be implemented. They provide a more detailed explaination and some PHP psuedo-code to help illustrate the point.

0 comments voice your opinion now!
openbasedir vulnerability race condition openbasedir vulnerability race condition


blog comments powered by Disqus

Similar Posts

PHP Security Blog: Month of PHP bugs

Greg Beaver's Blog: Quick review of Pixy vulnerability scanner for PEAR users

Secunia.com: WordPress Issues - Two Plugins (wp-Table & wordTube) and a Debian Update

Secunia.com: Avaya Products PHP Multiple Vulnerabilities

Hardened-PHP Project: Advisory - PHP open_basedir Race Condition Vulnerability


Community Events





Don't see your event here?
Let us know!


install series update opinion language deployment interview community podcast introduction framework symfony list tips release zendserver laravel library package api

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework