PHP mail函数绕过safe_mode限制执行命令漏洞

漏洞信息详情

PHP mail函数绕过safe_mode限制执行命令漏洞

漏洞简介

PHP是一种流行的WEB服务器端编程语言,它功能强大,简单易用,在很多Unix操作系统默认都安装了PHP, 它也可以在Windows系统下运行。
PHP函数mail的第五个参数存在漏洞,远程攻击者可能利用此漏洞结构CGI脚本中的漏洞绕过PHP的safe_mode的限制执行系统命令。
从PHP-4.0.5开始,mail函数引入了第五个参数。去年被发现该参数没有很好过滤shell字符使得可以绕过safe_mode的限制执行系统命令。( http://www.nsfocus.com/index.php?act=sec_bug&do=view&bug_id=1593 )该漏洞在PHP-4.0.6被修复。
然而,PHP的mail函数仍然存在漏洞。mail函数的第五个参数可以在发送mail的时候给MTA(php.ini的sendmail_path设定,默认都是sendmail)传递额外的选项参数,sendmail的-Cfile选项能够改变配置文件,利用sendmail的特性,我们可以在配置文件里指定执行命令,从而使得PHP的mail函数绕过safe_mode的限制来执行任意系统命令。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* 如果您的主机有其它Web用户可以建立PHP脚本,请在php.ini里暂时关闭mail函数:

disable_functions = mail

然后重启WEB Server。

* 使用PHP的最新CVS代码重新编译PHP。
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-168-1)以及相应补丁:

DSA-168-1:New PHP packages fix several vulnerabilities

链接:http://www.debian.org/security/2002/dsa-168” target=”_blank”>
http://www.debian.org/security/2002/dsa-168

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2.dsc

Size/MD5 checksum: 1079 82d2b9adff31130eafe78fe9c647d098

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2.diff.gz

Size/MD5 checksum: 39264 e44f4917ce887f53ac7019ab4e3692ba

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18.orig.tar.gz

Size/MD5 checksum: 2203818 da541ac71d951c47a011ceb26664ba2d

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4.dsc

Size/MD5 checksum: 1125 e9b5dbf3554c63dd654e69c83da63a97

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4.diff.gz

Size/MD5 checksum: 134587 9a862082a0b60f6e2f0fa9c993d3ff19

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1.orig.tar.gz

Size/MD5 checksum: 2214630 e65b706a7fc4469d1ccd564ef8a2c534

Alpha architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_alpha.deb

Size/MD5 checksum: 438822 748bb657dff328c22920c186e2ab83a1

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_alpha.deb

Size/MD5 checksum: 619332 e9dca7c64949f2d635ff5ed7da682c5d

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_alpha.deb

Size/MD5 checksum: 520090 76a0ac1f943c108f28a4238723415367

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_alpha.deb

Size/MD5 checksum: 868874 b8041d6976c11fbb63d0481869351658

ARM architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_arm.deb

Size/MD5 checksum: 379276 3900254a218ea8b08f12adcee5826978

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_arm.deb

Size/MD5 checksum: 490638 de60ee781cd3e2dc820fef82a1fe08a8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_i386.deb

Size/MD5 checksum: 359858 6ee0615cac086a0da432ed40e0edab68

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_i386.deb

Size/MD5 checksum: 458174 be4d1d9c54ba0207f39dedfaaaa7d748

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_i386.deb

Size/MD5 checksum: 412254 37751e39ac9688d17965cf947ed7f6fc

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_i386.deb

Size/MD5 checksum: 635076 b1dfc5587ea2719ff5a789fc02bc27ec

Motorola 680×0 architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_m68k.deb

Size/MD5 checksum: 355170 9b7fef1df1cc28988eb3f7fdde94dd61

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_m68k.deb

Size/MD5 checksum: 429244 1aec470dce3cc9babe341661c7023281

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_m68k.deb

Size/MD5 checksum: 408462 29b1bc7739a65d4ebd95d848bccbaf5c

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_m68k.deb

Size/MD5 checksum: 592990 2d3fbdc339ba1692d1c7e98fc50b9920

PowerPC architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_powerpc.deb

Size/MD5 checksum: 380012 c2990c5ec38b1fc4d218a51c750f9963

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_powerpc.deb

Size/MD5 checksum: 492568 eebeab3f920fad4812f418045750a489

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_powerpc.deb

Size/MD5 checksum: 451892 54e8183df00abee5c8498b4caed0a679

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_powerpc.deb

Size/MD5 checksum: 689728 bd2aeebd0605f35395106a4ce0c76cef

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3_3.0.18-0potato1.2_sparc.deb

Size/MD5 checksum: 371252 f3a0fb13377a8b5b67a851d2c204b87d

http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php3/php3-cgi_3.0.18-0potato1.2_sparc.deb

Size/MD5 checksum: 483476 e749a895f8e9d429d7e3d6eb0f35a945

http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4_4.0.3pl1-0potato4_sparc.deb

Size/MD5 checksum: 435060 be65d0d8c66e0bdcf5aa3a337a019ea6

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.0.3pl1-0potato4_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/p/php4/php4-c


参考网址

来源: XF
名称: php-safemode-elevate-privileges(6787)
链接:http://www.iss.net/security_center/static/6787.php

来源: www.php.net
链接:http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz

来源: BID
名称: 2954
链接:http://www.securityfocus.com/bid/2954

来源: REDHAT
名称: RHSA-2003:159
链接:http://www.redhat.com/support/errata/RHSA-2003-159.html

来源: REDHAT
名称: RHSA-2002:129
链接:http://www.redhat.com/support/errata/RHSA-2002-129.html

来源: REDHAT
名称: RHSA-2002:102
链接:http://www.redhat.com/support/errata/RHSA-2002-102.html

来源: BUGTRAQ
名称: 20010630 php breaks safe mode
链接:http://online.securityfocus.com/archive/1/194425

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享