what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PHP 5.3 mysqli_real_escape_String() Disclosure

PHP 5.3 mysqli_real_escape_String() Disclosure
Posted Sep 29, 2009
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

PHP versions 5.3 and below suffer from a mysqli_real_escape_string() related full path disclosure vulnerability.

tags | advisory, php
SHA-256 | fd8379906be076c6c118615ff73d9afa57225ac48ec1b4423658885a20fc46ab

PHP 5.3 mysqli_real_escape_String() Disclosure

Change Mirror Download
[MajorSecurity Advisory #59]PHP <=5.3 - mysqli_real_escape_string() full 
path disclosure

Details
=======
Product: PHP <=5.3
Security-Risk: low
Remote-Exploit: yes
Vendor-URL: http://www.php.net/
Vendor-Status: informed
Advisory-Status: published

Credits
============
Discovered by: David Vieira-Kurz
http://www.majorsecurity.info

Affected Products:
----------------------------
PHP 5.3 and prior
PHP 5.2.11 and prior

Original Advisory:
============
http://www.majorsecurity.info/index_2.php?major_rls=major_rls59

Introduction
============
"PHP is a widely-used general-purpose scripting language that is
especially suited for Web development and can be embedded into HTML."
- from php.net

More Details
============
1. Full Path Disclosure
-----------------------------------
There is a full path disclosure vulnerability concerning the
mysqli_real_escape_string() php function which allow attackers to
gather the real path of the server side script.

The mysqli_real_escape_string() PHP function takes strings as parameters
and will raise warnings when values that are passed are arrays rather
then strings.
To get the path of the current script, you simply need to pass the
arguments as arrays rather then expected strings
and then simply read the warning message generated by PHP to see the
error including the full path of the current running script.

Proof of concept:
http://localhost/cms/sqlfilter/sqlsanatizer.php?params[]=

Warning: mysqli_real_escape_string() expects parameter 1 to be string,
array given in /var/www/vhosts/cms/sqlfilter/sqlsanatizer.php

Solution
================
I would NOT recommend to just react by "security through obscurity" and
turn off the error messages, error reporting etc.
This is not a solution because there are a lot of users that are having
a shared hosting server where they aren't able to manipulate
the "php.ini" configuration file - even ini_set() is forbidden on some
shared hoster servers.
So they still would have the full path disclosure there.

So, what's the workaround then ?

Workaround
================
I would recommend to meticulously go through the code forcing PHP to
cast the data to the desired type, in this case the (string) casts
to eliminate the Notice or Warning messages.

Example:
<?PHP
if(isset($_GET['user'])) {
if (is_array($user = $_GET['user'])) {

$casted = (string)$user;
// next steps
...
} else {
$query = sprintf("SELECT * FROM users WHERE user='%s'",
mysqli_real_escape_string($user),
}
}
?>

MajorSecurity
================
MajorSecurity is a German penetrationtesting and security research
company which focuses
on web application security. We offer professional penetrationtestings,
security audits,
source code reviews and reliable proof of concepts.
You will find more Information about MajorSecurity at
http://www.majorsecurity.info/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close