STE WILLIAMS

Are PHP SuperGlobal Parameters Really That Big A Deal?

Sep
12

A new report out this week from Imperva detailing the potential danger for attacks through vulnerable PHP SuperGlobal parameters suggests that organizations running PHP servers should ditch the use of these variables in application requests. But while other security experts agree that PHP security must be addressed to prevent serious breaches, they argue that the real problem is in server patching practices rather than the use of SuperGlobal variables.

“PHP is definitely a vulnerable language when not implemented correctly and unfortunately most web programmers don’t truly understand the vulnerabilities or attack vectors associated with them,” says Joshua Crumbaugh, lead penetration tester at IT Cyber Security.

Released on Monday, the report chronicled the attack methods that Imperva researchers observed across a sample of 24 applications containing attack vectors related to SuperGlobal variables, noting that they identified 144 related attacks per application within a month, with some attack campaigns lasting over the course of five months. In particular, the report showed how attackers are commonly able to chain together multiple low-impact vulnerabilities related to SuperGlobal in order to achieve variable manipulation, security filter evasion and arbitrary code execution.

[Is IPS in it for the long haul? See The Future of IPS.]

“One of the key lessons for enterprises that they should defend themselves even against what seems to be in the beginning a really not so important vulnerability because when it is chained with other not so important vulnerabilities, together they can create a really powerful exploit,” says Tal Be’ery, leader of Imperva’s web research team.

According to Be’ery, while PHP security has generally improved over the last few years has improved, it’s not getting better fast enough, particularly for a language that by his firm’s estimates powers over 80 percent of the web. While most security would agree with that sentiment, some are taking issue with Be’ery’s and Imperva’s public push against SuperGlobal.

“Instead of calling to remove SuperGlobals, it might be better to call on people to update their PHP,” says Serge Batchilo, a security researcher for Security Innovation. “The vulnerabilities at the root of this wave of attacks are CVE-2010-3065 and CVE-2011-2505, which means they have been assigned CVE identifiers in 2010 and 2011 respectively and are almost certainly patched in PHP versions for the past couple of years.”

Batchilo accused Imperva of drumming up controversy with what he calls an “essentially trivial finding,” explaining that the best way to improve PHP security is through more timely patching.

“Removing SuperGlobals would break a lot of PHP applications and is not likely to happen in the short term, while installing patches that have been available for years is a simple and effective solution that can be easily implemented in the short term,” Batchilo says. “When a patched vulnerability is being exploited, it is common sense to install the patch. It’s even better just to update servers periodically as a preventative measure.”

Crumbaugh agrees, reiterating that the number one recommendation he has for those administering PHP applications is to keep those applications and the system upgraded.

“Unless there are some serious flaws in the implementation of your software or gigantic configuration errors it’s rare that I can break into a server with fully patched software and services,” he says, explaining that he frequently exploits out-of-date PHP systems in his penetration tests, noting that he frequently runs into companies taking years to update critical vulnerabilities. “Keep everything up to date and you’ll increase your security posture.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/are-php-superglobal-parameters-really-th/240161140

Comments

Comments are closed.