|
Posted by william.hooper on 10/14/07 17:57
I also trying to get my hear around:
http://www.attackers-r-us.com/nastycode
This translates to http://www.attackers-r-us.com/nastycode.php and
with allow_url_fopen enabled, this remote file will be included into
the script and executed. Note that the remote server would have to
serve php files as the raw script, instead of processing them with a
PHP module first, in order for this attack to be effective, or a
script would have to output PHP code ( readfile(realnastycode.php) for
instance).
Mechanisms such as the above allow attackers to execute any code they
desire on vulnerable web systems.
One simple way to prevent this style of attack is to disable
allow_url_fopen. This can be set in php.ini.
Navigation:
[Reply to this message]
|