register_globals is often turned on to support legacy code and
CVE-2005-3390 makes code which by the documentation should be safe not so.

Consider:

> ; You should do your best to write your scripts so that they do not require
> ; register_globals to be on;  Using form variables as globals can easily lead
> ; to possible security problems, if the code is not very well thought of.

>From the Debian-shipped php.ini, certainly does not warn that
register_globals itself is a security problem, but rather that poorly
written scripts are.


> but keep in mind that the directive itself isn't insecure but rather it's the
> misuse of it.

>From <http://www.php.net/register_globals>. The page also notes that
reliance on the directive "was quite common and many people didn't even
know it existed and assumed it's just how PHP works." It then goes on to
explain how register_globals is unsafe --- examples which show the
well-known register_globals problem, not the CVE-2005-3390 one. Further,
one of the examples (29-3) could even be subverted by this bug!

Also, considering the number of Debian installations which probably have
register_globals turned on, and how that makes (as already pointed out
in this bug) anything using PEAR extremely vulnerable, I really think
this ought to be fixed in stable ASAP.

CVSS rates this as an 8 (high).
testing-security rates this as medium.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to