Edit report at https://bugs.php.net/bug.php?id=52312&edit=1
ID: 52312 Comment by: Terry at ellisons dot org dot uk Reported by: v dot damore at gmail dot com Summary: PHP safe_mode/open_basedir - lstat performance problem Status: Analyzed Type: Bug Package: Safe Mode/open_basedir Operating System: Linux PHP Version: 5.2.13 Block user comment: N Private report: N New Comment: For the purposes of this bug, let's document the advisory which triggered this change: CVE-2006-5178 see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5178. Let's be honest, even with this patch there is still a minuscule chance that the exploit described could succeed, because we can't go into kernel mode during the recursive descent and prevent other processes with a higher nice being scheduled in and doing the dirty. So it replaces "very small" by "even smaller" at the same time killing NFS performance. As I said don't remove this change, just make it elective by adding an extra variant of the open_basedir parameter, and openly documenting the issues so that sysadmins can make their own judgement call on security vs performance. Let's face it on a typical shared service I can think of easier ways to do this exploit. E.g. if exec and the proc functions aren't disabled then there is no point in having a strong open_basedir. If you are an enterprise and just want to lock down your apps programmers from breaching good practice / infrastructure standards over a NAS infrastructure then the weak form is perfectly appropriate. Also IMO, PHP is trying to do a better job here than the standard Linux realpath function and failing. Previous Comments: ------------------------------------------------------------------------ [2013-02-22 23:26:14] ras...@php.net There is no such thing as a "miniscule race" when it comes to computers. Either there is a race condition or there isn't. In this case there is. So if we remove this check open_basedir will be much less secure. Something along the lines of Marcin's idea of separate caches might be feasible, but this is not a small change. ------------------------------------------------------------------------ [2013-02-22 23:17:59] Terry at ellisons dot org dot uk This bug is extant in 5.3 and 5.4 (up to 5.4.9). The flaw is the logic in main/main.c:php_module_startup(): /* Disable realpath cache if safe_mode or open_basedir are set */ if (PG(safe_mode) || (PG(open_basedir) && *PG(open_basedir))) { CWDG(realpath_cache_size_limit) = 0; } Similar logic validly exists in code such as suEXEC and suPHP to prevent a race condition allowing and unscrupulous script author to execute a script in another UID in certain circumstances. This simply doesn't apply in this case. Which technically a similar race could allow a script author to break the basedir contain with miniscule probability by exploiting such a race, the performance impacts are significant, for no material increase in security strength. Get rid of this rule or at least split open_basedir into two separate directives open_basedir_paranoid which disables the cache as above and open_basedir which does the rational checks and doesn't disable the cache. This has been lying around for nearly 3 years. How can we progress this? ------------------------------------------------------------------------ [2012-07-31 20:00:48] marcin at 6irc dot net How about having concurrent cache tables for each basedir setting? For instance, when open_basedir is set to '/home/teh1234;/tmp', then the lstat populates only cache table "0", realpath_cache_* also uses exclusively this cache, and when open_basedir is set to '/home/klaczy;/tmp' then it populates and uses only cache table "1"? Are there any security considerations that I don't notice here? ------------------------------------------------------------------------ [2011-08-16 18:52:34] spam2 at rhsoft dot net > Caching open_basedir stats is insecure not really because the permissions are not changed the whole day ------------------------------------------------------------------------ [2011-07-03 21:21:21] ras...@php.net I really don't see a middle ground here. You are either secure or you aren't. Caching open_basedir stats is insecure and the whole point of open_basedir in a shared hosting setup is to secure these file accesses. If you don't care about security, turn it off and live with the security issue, or better yet, change your shared hosting setup to use VMs or other lower-level strategies that keep users separated from each other. ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at https://bugs.php.net/bug.php?id=52312 -- Edit this bug report at https://bugs.php.net/bug.php?id=52312&edit=1