> Steve West wrote:
> > Hi folks,
> >
> > I'm wondering if anyon knows how to prevent some PHP 4.4.x/5.x
> > vulnerabilities via mod_security until PHP group releases fixes for
> > these. Here is more info on the vulnerabilities:
> >
> > PHP copy() function: http://securitytracker.com/alerts/2006/Apr/1015882=
.html
For this one you could try looking for the string "compress.zlib:", e.g.
SecFilterSelective ARGS_VALUES compress\.zlib:
> > PHP tempname() Arg: http://securitytracker.com/alerts/2006/Apr/1015881.=
html
> >
> > PHP crashing Apache: http://securitytracker.com/alerts/2006/Apr/1015880=
.html
These two require someone to be able to place code on the server. If
they can do that you have bigger problems :)
Terry Dooher wrote:
> If I read these right, jailing Apache and PHP should mitigate
> the potential damage.
Correct.
Terry Dooher wrote:
> SecChrootDir in mod_security will only jail apache, though, not PHP, so I
> don't think it will help in this case.
That's not true. SecChrootDir will chroot the entire process,
including the processes created at runtime (after chroot takes place).
(One does need to be carefull with "process daemons", such as
mod_cgid, though, as they may spawn before the chroot call. This
should not happen with 1.9.3 but it's better to check.) However, I
don't think it is possible to add SecChrootDir to an already-running
shared hosting platform. It would break too many things.
--
Ivan Ristic, Technical Director
Thinking Stone, http://www.thinkingstone.com
ModSecurity: Open source Web Application Firewall
|