Gif Exploit

Discussions of secure PHP coding. Security in software is important, so don't be afraid to ask. And when answering: be anal. Nitpick. No security vulnerability is too small.

Moderator: General Moderators

Post Reply
User avatar
Benjamin
Site Administrator
Posts: 6935
Joined: Sun May 19, 2002 10:24 pm

Gif Exploit

Post by Benjamin »

User avatar
superdezign
DevNet Master
Posts: 4135
Joined: Sat Jan 20, 2007 11:06 pm

Post by superdezign »

I heard about that last night on Digg. Everyone was panicking and such, but I was just proud of whoever successfully made it. :D
User avatar
Weirdan
Moderator
Posts: 5978
Joined: Mon Nov 03, 2003 6:13 pm
Location: Odessa, Ukraine

Post by Weirdan »

that article wrote: When users download the image to view it, the server parses the PHP code and the exploit is executed, as it serves the image to the user.
Who on earth would configure webserver to parse images as PHP files?? Too stupid to be true.
User avatar
Benjamin
Site Administrator
Posts: 6935
Joined: Sun May 19, 2002 10:24 pm

Post by Benjamin »

I was wondering the same thing. Doesn't really make sense to me.
User avatar
The Phoenix
Forum Contributor
Posts: 294
Joined: Fri Oct 06, 2006 8:12 pm

Post by The Phoenix »

Weirdan wrote:Who on earth would configure webserver to parse images as PHP files?? Too stupid to be true.
I'm wondering if everyones favorite mod_rewrite action (funnel any unknown file to a php script for processing) is part of the magic making it happen often.
timvw
DevNet Master
Posts: 4897
Joined: Mon Jan 19, 2004 11:11 pm
Location: Leuven, Belgium

Post by timvw »

A possible way to 'exploit' was mentionned a while ago here: http://ha.ckers.org/blog/20070604/passi ... imagesize/
User avatar
Benjamin
Site Administrator
Posts: 6935
Joined: Sun May 19, 2002 10:24 pm

Post by Benjamin »

Not checking the file extension! 8O

That would do it.
Post Reply