20 Jul 2017 by Dr. Johannes Dahse
Popular security vulnerabilities occur due to bad coding practices or coding mistakes. Often a single missing character or incautiously used language feature opens the gates for an external attacker. But even when all best practices for secure programming are carefully adhered to, a PHP application’s source code is only as secure as the PHP interpreter it runs on. In this post, we will see how memory corruption bugs in the PHP core itself can affect an application’s security.Read More ...
3 May 2017 by Robin Peraglie
During our advent of PHP application vulnerabilities, we reported a remote command execution vulnerability in the popular webmailer Roundcube (CVE-2016-9920). This vulnerability allowed a malicious user to execute arbitrary system commands on the targeted server by simply writing an email via the Roundcube interface. After we reported the vulnerability to the vendor and released our blog post, similar security vulnerabilities that base on PHP’s built-in Read More ...
mail() function popped up in other PHP applications . In this post, we have a look at the common ground of these vulnerabilities, which security patches are faulty, and how to use
18 Apr 2017 by Martin Bednorz
We are happy to announce the next iteration of our static analysis software for PHP! The new release RIPS 2.0.0 includes the following major changes:
- A complete new interface with optimized performance (demo.ripstech.com)
- A new extensive REST API for full feature automation (api.ripstech.com)
- Team and user privilege management
- Application-specific analysis profiles
- More detailed code summaries and issue descriptions
- Issue categorization for PCI DSS compliance requirements
- Improved analysis precision and performance
- Detection of Cookie Misconfiguration issues (CWE-613, CWE-614, CWE-1004)
- Detection of Insufficient Certificate Validation issues (CWE-295, CWE-297)
Find out more about the top 5 new features in this blog post.Read More ...
24 Dec 2016 by Johannes Dahse
In this years Advent of PHP Application Vulnerabilities (APAV), we examined 36 critical security issues which were detected in 19 different PHP applications by our code analysis solution RIPS. In our final post, we would like to summarize what we learned during this thrilling advent time. We reveal how the affected vendors reacted to our reportings behind the scenes. Was it right to publish all these sensitive issues? What conclusions can we draw about the security state of PHP applications from our findings?Read More ...
23 Dec 2016 by Hendrik Buchwald
The 23rd gift in our advent calendar presents security issues in e107, a content management system that is in development since 2013. Among others, we identified a critical issue that allows any user to update his permissions and to extract sensitive information from the database by exploiting a PHP object injection vulnerability.Read More ...