Home

“Unserialize” Function in PHP 7 Allows Attackers to Take Full Control Over Server

IT | Jan 3, 2017 | Master3395

PHP 7’s “unserialize” function is plagued by a series of vulnerabilities that could allow an attacker to take full control over affected servers, Check Point security researchers reveal.

Tracked as CVE-2016-7479, CVE-2016-7480, and CVE-2016-7478, the vulnerabilities are new, but they can be exploited in a similar manner as detailed in a separate vulnerability detailed in August. The flaw, a use-after-free in SPL, could be exploited “by using re-usable exploit primitives for PHP 7 unserialize vulnerabilities,” Check Point said in August.

In a report (PDF) that provides full details of the exploitation method, Check Point experts explained that the unserialize function could be abused to read memory, to forge objects, and to achieve code execution on the affected server. They also underlined that the function was dangerous and that it had been proven so numerous times over the past years, although it remained in use.

In August, the security researchers also said that the aforementioned re-usable exploit primitives were general enough to be applied to all vulnerabilities found in the unserialize mechanism. Now, they claim that the newly discovered flaws can be abused in a similar manner, which apparently confirms the previous statement.

What’s more, the security firm notes that flaws in the unserialize mechanism were heavily exploited in PHP 5 by hackers looking to compromise popular platforms, including Magento, vBulletin, Drupal, and Joomla!. Attackers were able to compromise other web servers as well, by sending maliciously crafted data in client cookies.

According to Check Point, the first two of the fresh bugs allow an attacker to take full control over the impacted servers. Thus, they could do “anything they want with the website, from spreading malware to defacing it or stealing customer data,” the security researchers warn.

As for the third bug, it can be abused to generate a Denial of Service (DoS) attack through which the attacker would basically hang the website, move to exhaust its memory consumption, and then shut it down.

The three security issues were made public this week, but they were found earlier this year. According to Check Point, the vulnerabilities were reported to the PHP security team on September 15 and August 6. Two of the vulnerabilities were resolved on October 13 and December 1, but one of them remains unpatched.
“ PHP 7, the latest release of the popular web programming language that powers more than 80% of websites, offers great advantages for website owners and developers. Some of them include doubling the performance and adding numerous functionalities. Yet for hackers, it represents a completely fresh attack vector, where they can find previously undisclosed vulnerabilities,” Check Point notes.

 

Keywords: PhP 7, Security issues with PHP, Unserialize in PHP

Author: Master3395

Comments:

comments powered by Disqus
Discord

Page 1 of 429  >  >>

When will it end? Now there are problems with the batteries as well

microsoft-surface-pro-4png.png

Aug 22, 2019 | Category: General | Comments

Surface is already struggling with CPU and WiFi.

read more…

Apple TV launches in November for $ 10 a month

appletvplus-800x459.jpg

Aug 21, 2019 | Category: Microsoft | Comments

At the same time increases the budget for original content.

read more…

US companies have 90 days to end Huawei cooperation

hua.jpg

Aug 20, 2019 | Category: General | Comments

But that's not to be kind to Huawei.

US authorities have decided to allow US companies to do business with Huawei a little longer. Just as Reuters reported yesterday.

read more…

Page 1 of 429  >  >>