Vuln php passthru

From Atomicorp Wiki
Revision as of 22:01, 8 December 2012 by Mshinn (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

PHP function passthru() allows an attacker to execute shell commands through php

The passthru() functions allows an application, user or attacker to send direct commands to the operating system through PHP. For example, passthru() can be used to run shell commands.


Next Steps

If this risk is unacceptable for your system, then you will want to disable this capability in PHP.

Step 1: Log into the ASL GUI, click on Configuration and select the ASL configuration menu option. This will open the ASL configuration screen.

Step 2: Scroll down to PHP_CHECKS and make sure this is set to "yes". By default ASL will only warn about PHP vulnerabilities. If you set this to yes, it will also fix these vulnerabilities. If this is set to "no" the next step will not work, so set this to "yes".

Step 3: Scroll down to ALLOW_passthru and set this to "no".

Step 4: Click the "update" button.

This will resolve this vulnerability.

Personal tools