diff options
| author | Ben Fuhrmannek | 2021-02-16 11:16:59 +0100 |
|---|---|---|
| committer | Ben Fuhrmannek | 2021-02-16 11:16:59 +0100 |
| commit | 5484bcb5eb2714e7438927e2566c86a74d7c51af (patch) | |
| tree | b78326d2999397be4c08e06b23209981f82a4ea9 /doc/source/features.rst | |
| parent | 7ac1e3866ef4f146c6c93a5ca13b9aebb14e936a (diff) | |
| parent | cecfdd808da67be908dbe7144cc8c74dfb3f855e (diff) | |
Merge remote-tracking branch 'upstream/master'
Diffstat (limited to 'doc/source/features.rst')
| -rw-r--r-- | doc/source/features.rst | 41 |
1 files changed, 29 insertions, 12 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst index 0c23dc1..2eebc88 100644 --- a/doc/source/features.rst +++ b/doc/source/features.rst | |||
| @@ -30,10 +30,13 @@ This feature is even more effective when used along with :ref:`readonly_exec <re | |||
| 30 | Examples of related vulnerabilities | 30 | Examples of related vulnerabilities |
| 31 | """"""""""""""""""""""""""""""""""" | 31 | """"""""""""""""""""""""""""""""""" |
| 32 | 32 | ||
| 33 | - `CVE-2017-7981 <https://tuleap.net/plugins/tracker/?aid=10159>`_: Authenticated remote code execution on Tuleap | 33 | - `CVE-2013-3630 <https://www.rapid7.com/db/modules/exploit/multi/http/moodle_cmd_exec>`__: Authenticated remote code execution in Moodle |
| 34 | - `CVE-2014-4688 <https://www.pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc>`_: Authenticated remote code execution on pfSense | 34 | - `CVE-2014-1610 <https://www.rapid7.com/db/modules/exploit/multi/http/mediawiki_thumb>`__: Unauthenticated remote code execution in DokuWiki |
| 35 | - `CVE-2014-1610 <https://www.rapid7.com/db/modules/exploit/multi/http/mediawiki_thumb>`_: Unauthenticated remote code execution on DokuWiki | 35 | - `CVE-2014-4688 <https://www.pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc>`__: Authenticated remote code execution in pfSense |
| 36 | - `CVE-2013-3630 <https://www.rapid7.com/db/modules/exploit/multi/http/moodle_cmd_exec>`_: Authenticated remote code execution on Moodle | 36 | - `CVE-2017-7981 <https://tuleap.net/plugins/tracker/?aid=10159>`__: Authenticated remote code execution in Tuleap |
| 37 | - `CVE-2018-20434 <https://www.exploit-db.com/exploits/47044>`__: Authenticated remote code execution in LibreNMS | ||
| 38 | - `CVE-2020-5791 <https://www.tenable.com/security/research/tra-2020-58)>`__: Authenticated remote code execution in Nagios XI | ||
| 39 | - `CVE-2020-8813 <https://www.exploit-db.com/exploits/48159>`__: Unauthenticated remote code execution in Cacti | ||
| 37 | - Every single `modem/router/switch/IoT/… <https://twitter.com/internetofshit>`_. | 40 | - Every single `modem/router/switch/IoT/… <https://twitter.com/internetofshit>`_. |
| 38 | 41 | ||
| 39 | 42 | ||
| @@ -62,6 +65,7 @@ Examples of related vulnerabilities | |||
| 62 | - `CVE-2016-10074 <https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html>`_: remote code execution in SwiftMailer | 65 | - `CVE-2016-10074 <https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html>`_: remote code execution in SwiftMailer |
| 63 | - `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer | 66 | - `CVE-2016-10033 <https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html>`_: remote code execution in PHPMailer |
| 64 | - `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube | 67 | - `CVE-2016-9920 <https://www.ripstech.com/blog/2016/roundcube-command-execution-via-email/>`_: Unauthenticated remote code execution in Roundcube |
| 68 | - `CVE-2019-???? <https://www.exploit-db.com/exploits/46136>`__: Unauthenticated remote code execution in Horde | ||
| 65 | 69 | ||
| 66 | .. _cookie-encryption-feature: | 70 | .. _cookie-encryption-feature: |
| 67 | 71 | ||
| @@ -115,6 +119,9 @@ Examples of related vulnerabilities | |||
| 115 | - `CVE-2017-6090 <https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/>`_: Unauthenticated remote code execution in PhpCollab | 119 | - `CVE-2017-6090 <https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/>`_: Unauthenticated remote code execution in PhpCollab |
| 116 | - `EDB-38407 <https://www.exploit-db.com/exploits/38407/>`_: Authenticated remote code execution in GLPI | 120 | - `EDB-38407 <https://www.exploit-db.com/exploits/38407/>`_: Authenticated remote code execution in GLPI |
| 117 | - `CVE-2013-5576 <https://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads>`_: Authenticated remote code execution in Joomla | 121 | - `CVE-2013-5576 <https://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads>`_: Authenticated remote code execution in Joomla |
| 122 | - `CVE-2019-15813 <https://www.exploit-db.com/exploits/48955>`__: Authenticated remote code execution in Sentrifugo | ||
| 123 | - `CVE-2019-17132 <http://karmainsecurity.com/KIS-2019-02>`__: Authenticated remote code execution in vBulletin | ||
| 124 | - `CVE-2020-10682 <http://dev.cmsmadesimple.org/bug/view/12275>`__: Authenticated remote code execution in CMS Made Simple | ||
| 118 | - `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM | 125 | - `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM |
| 119 | 126 | ||
| 120 | 127 | ||
| @@ -154,21 +161,26 @@ without the need to invalidate any data. | |||
| 154 | 161 | ||
| 155 | A nice side-effect of this feature is that it will defeat various memory corruption | 162 | A nice side-effect of this feature is that it will defeat various memory corruption |
| 156 | issues related to the complexity of ``unserialize``'s implementation, | 163 | issues related to the complexity of ``unserialize``'s implementation, |
| 157 | and the amount of control if provides to an attacker, like `CVE-2016-9137, CVE-2016-9138 <https://bugs.php.net/bug.php?id=73147>`_, | 164 | and the amount of control if provides to an attacker, like `CVE-2016-9137, |
| 158 | `2016-7124 <https://bugs.php.net/bug.php?id=72663>`_, `CVE-2016-5771 and CVE-2016-5773 <https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/>`_. | 165 | CVE-2016-9138 <https://bugs.php.net/bug.php?id=73147>`_, `2016-7124 |
| 166 | <https://bugs.php.net/bug.php?id=72663>`_, `CVE-2016-5771 and CVE-2016-5773 | ||
| 167 | <https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/>`_. | ||
| 159 | 168 | ||
| 160 | 169 | ||
| 161 | Examples of related vulnerabilities | 170 | Examples of related vulnerabilities |
| 162 | """"""""""""""""""""""""""""""""""" | 171 | """"""""""""""""""""""""""""""""""" |
| 163 | 172 | ||
| 164 | - `CVE-2016-???? <https://www.computest.nl/advisories/CT-2016-1110_Observium.txt>`_: Unauthenticated remote code execution in Observium (leading to remote root) | 173 | - `CVE-2012-5692 <https://www.rapid7.com/db/modules/exploit/unix/webapp/invision_pboard_unserialize_exec>`_: Unauthenticated remote code execution in IP.Board |
| 165 | - `CVE-2016-5726 <http://seclists.org/oss-sec/2016/q2/521>`_: Unauthenticated remote code execution in Simple Machines Forums | 174 | - `CVE-2014-1691 <http://seclists.org/oss-sec/2014/q1/153>`_: Unauthenticated remote code execution in Horde |
| 175 | - `CVE-2015-7808 <https://www.rapid7.com/db/modules/exploit/multi/http/vbulletin_unserialize>`_: Unauthenticated remote code execution in vBulletin | ||
| 176 | - `CVE-2015-8562 <https://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce>`_: Unauthenticated remote code execution in Joomla | ||
| 166 | - `CVE-2016-4010 <http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/>`_: Unauthenticated remote code execution in Magento | 177 | - `CVE-2016-4010 <http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/>`_: Unauthenticated remote code execution in Magento |
| 178 | - `CVE-2016-5726 <http://seclists.org/oss-sec/2016/q2/521>`_: Unauthenticated remote code execution in Simple Machines Forums | ||
| 179 | - `CVE-2016-???? <https://www.computest.nl/advisories/CT-2016-1110_Observium.txt>`_: Unauthenticated remote code execution in Observium (leading to remote root) | ||
| 167 | - `CVE-2017-2641 <http://netanelrub.in/2017/03/20/moodle-remote-code-execution/>`_: Unauthenticated remote code execution in Moodle | 180 | - `CVE-2017-2641 <http://netanelrub.in/2017/03/20/moodle-remote-code-execution/>`_: Unauthenticated remote code execution in Moodle |
| 168 | - `CVE-2015-8562 <https://www.rapid7.com/db/modules/exploit/multi/http/joomla_http_header_rce>`_: Unauthenticated remote code execution in Joomla | 181 | - `CVE-2018-17057 <https://www.exploit-db.com/exploits/46634>`: Unauthenticated remote code execution in LimeSurvey |
| 169 | - `CVE-2015-7808 <https://www.rapid7.com/db/modules/exploit/multi/http/vbulletin_unserialize>`_: Unauthenticated remote code execution in vBulletin | 182 | - `CVE-2018-19274 <https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/>`__: Authenticated remote code execution in phpBB |
| 170 | - `CVE-2014-1691 <http://seclists.org/oss-sec/2014/q1/153>`_: Unauthenticated remote code execution in Horde | 183 | - `CVE-2019-6340 <https://www.ambionics.io/blog/drupal8-rce>`__: Unauthenticated remote code execution in Drupal |
| 171 | - `CVE-2012-5692 <https://www.rapid7.com/db/modules/exploit/unix/webapp/invision_pboard_unserialize_exec>`_: Unauthenticated remote code execution in IP.Board | ||
| 172 | 184 | ||
| 173 | 185 | ||
| 174 | .. _harden-rand-feature: | 186 | .. _harden-rand-feature: |
| @@ -317,6 +329,8 @@ and various other types mismatch. | |||
| 317 | This feature is largely inspired from the | 329 | This feature is largely inspired from the |
| 318 | `autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__. | 330 | `autostrict <https://github.com/krakjoe/autostrict>`_ module from `krakjoe <http://krakjoe.ninja>`__. |
| 319 | 331 | ||
| 332 | PHP8 already has [this feature](https://wiki.php.net/rfc/consistent_type_errors) for internal functions. | ||
| 333 | |||
| 320 | 334 | ||
| 321 | .. _sloppy-comparisons-feature: | 335 | .. _sloppy-comparisons-feature: |
| 322 | 336 | ||
| @@ -339,6 +353,9 @@ but also the `in_array | |||
| 339 | <https://secure.php.net/manual/en/function.array-search.php>`__ and `array_keys | 353 | <https://secure.php.net/manual/en/function.array-search.php>`__ and `array_keys |
| 340 | <https://secure.php.net/manual/en/function.array-keys.php>`__ functions. | 354 | <https://secure.php.net/manual/en/function.array-keys.php>`__ functions. |
| 341 | 355 | ||
| 356 | PHP8 is implementing [a subset](https://wiki.php.net/rfc/consistent_type_errors) of this feature. | ||
| 357 | |||
| 358 | |||
| 342 | .. _readonly-exec-feature: | 359 | .. _readonly-exec-feature: |
| 343 | 360 | ||
| 344 | Preventing execution of writable PHP files | 361 | Preventing execution of writable PHP files |
