Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:26373 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 57199 invoked by uid 1010); 6 Nov 2006 03:19:10 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 57184 invoked from network); 6 Nov 2006 03:19:10 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 6 Nov 2006 03:19:10 -0000 Authentication-Results: pb1.pair.com header.from=stas@zend.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=stas@zend.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain zend.com designates 212.25.124.162 as permitted sender) X-PHP-List-Original-Sender: stas@zend.com X-Host-Fingerprint: 212.25.124.162 mail.zend.com Linux 2.5 (sometimes 2.4) (4) Received: from [212.25.124.162] ([212.25.124.162:59217] helo=mail.zend.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id A5/44-25631-CA9AE454 for ; Sun, 05 Nov 2006 22:19:10 -0500 Received: (qmail 8434 invoked from network); 6 Nov 2006 03:17:41 -0000 Received: from unknown (HELO ?127.0.0.1?) (192.168.2.101) by internal.zend.office with SMTP; 6 Nov 2006 03:17:41 -0000 Message-ID: <454EA9AD.3030701@zend.com> Date: Sun, 05 Nov 2006 19:19:09 -0800 Organization: Zend Technologies User-Agent: Thunderbird 1.5.0.7 (Windows/20060909) MIME-Version: 1.0 To: Ilia Alshanetsky CC: internals@lists.php.net References: <454C5E50.4030108@zend.com> <454CFAA1.10104@lerdorf.com> <1EA6BEDC-ED17-4FE7-BDB1-B5E5C4FC4BFB@prohost.org> <4e89b4260611050813x42dc16fq74fc6ee240a0038d@mail.gmail.com> <2D1DBDC4-F023-43D1-8A9E-BAB953504BCB@prohost.org> <0936D8A3-72A3-4BD9-8394-AA0BC2193F56@prohost.org> <454E2BD4.6080601@zend.com> <8D0283BB-3656-410E-85CC-C38F3D708A22@prohost.org> In-Reply-To: <8D0283BB-3656-410E-85CC-C38F3D708A22@prohost.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] allow_url_include and php:/data: From: stas@zend.com (Stanislav Malyshev) > I guess it is a question of frequency, as a rule a valid use of > require/include on a URL is quite unusual. From my experience, I do not > believe the same could be said about smb. How many apps really need to import includes from foreighn systems which aren't mounted as drive letters? I don't think anybody does (or should) build an applications like that. > This is a valid point, but at the same time we need to consider the > consequences marking of smb:// as url will have on PHP applications and > weather this is something to be done in a patch level release. Sure, we need to consider that - I think that's exactly what we are doing now :) My assessment would be people usually don't do that purposefully, but you and everybody on the list are welcome to give examples to the contrary of course. > Exploitation wise all of the hacks I've seen for remote code execution > were based on http as that provides the best degree of anonymity for a SMB can be as anonymous as HTTP. The reason why HTTP is used more because you can easily buy HTTP hosting solution and SMB hosting would probably cost more, and because HTTP is much more known and easy to set up right to the script kiddies of all kinds. But once people figure out something can be hacked through SMB means, they would write a script to do it and script kiddies would do it as easily as anything. Once writing an exploit was are that few could master, now there are ready-made rootkits for any vulerability out there for anybody to use. > Use of SMB requires a more tricky infrastructure in a form of an open > smb share, usually meaning an exploited win32 box that accepts incoming > smb connections. "Pwned" windows boxes are not unheard of, to say the least. :) And any unix can do smb as good as windows, thanks to samba team ;) > A firewall rule can be used to block outgoing smb connections quite > easily on both linux and windows. Yes, sure - though standard config does not block that AFAIK and the whole point of allow_url_include is to protect such configs as far as I understand. -- Stanislav Malyshev, Zend Products Engineer stas@zend.com http://www.zend.com/