[horde] calls to popen()

Reindl Harald h.reindl at thelounge.net
Sat Feb 11 15:05:21 UTC 2012



Am 11.02.2012 15:43, schrieb Vilius Šumskas:
>> if there is any single bug with user inputs not correct
>> handeled an attacker would have the possibility to execute
>> local commands on the machine (with no open_basedir or any
>> other php-restrition active) including the ability to
>> trigger local (root) exploits if there are one existing
> 
> Then  it is a problem of the software which has the exploit or the sys
> admin which doesn't update his software.

and you are 100% sure that horde never has a bug
which is exploitet before an update exists?

>> to say it clear: a webapp with a bug using such functions makes
>> every local exploit to a remote exploit!
> 
> Then it is a problem of the webapp, not of the function.

and anybody interested in security does not allow
execution of shell-commands for webapps so that
currently unknown problems are even not exploitable
if they are disclosed at a time where no fix is available

>> every sysadmin not blocking the followed functions on
>> shared servers and for common applications has to be FIRED
> 
>> popen, pclose, exec, passthru, shell_exec, system, proc_open,
>> proc_close, proc_nice, proc_terminate,
>> proc_get_status, pcntl_exec, apache_child_terminate, posix_kill,
>> posix_mkfifo, posix_setpgid, posix_setsid,
>> posix_setuid, mail, symlink
> 
> You  know  that  safe_mode  is deprecated, right?

you know that you have no idea about what you are speaking?
what has this to do with safe_mode????????

SUHOSIN is that piece of software which blocked the some days
ago fixed remote-security-bug in PHP and many thousands generic
attacks in the last years and has nothing to do with safe_mode

also php has builtin "disable_functions" (but not per-site) what has
also NOTHING to do with safe_mode - so please stop to explain people
the world without having any education in security-topics

php_admin_value suhosin.executor.func.blacklist "popen, pclose, exec, passthru, shell_exec, system, proc_open,
proc_close, proc_nice, proc_terminate, proc_get_status, pcntl_exec, apache_child_terminate, posix_kill,
posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid, mail, symlink"


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 262 bytes
Desc: OpenPGP digital signature
URL: <http://lists.horde.org/archives/horde/attachments/20120211/6d30d60b/attachment.bin>


More information about the horde mailing list