3 May 2017 by Robin Peraglie
During our advent of PHP application vulnerabilities, we reported a remote command execution vulnerability in the popular webmailer Roundcube (CVE-2016-9920). This vulnerability allowed a malicious user to execute arbitrary system commands on the targeted server by simply writing an email via the Roundcube interface. After we reported the vulnerability to the vendor and released our blog post, similar security vulnerabilities that base on PHP’s built-in Read More ...
mail() function popped up in other PHP applications . In this post, we have a look at the common ground of these vulnerabilities, which security patches are faulty, and how to use
18 Apr 2017 by Martin Bednorz
We are happy to announce the next iteration of our static analysis software for PHP! The new release RIPS 2.0.0 includes the following major changes:
- A complete new interface with optimized performance (demo.ripstech.com)
- A new extensive REST API for full feature automation (api.ripstech.com)
- Team and user privilege management
- Application-specific analysis profiles
- More detailed code summaries and issue descriptions
- Issue categorization for PCI DSS compliance requirements
- Improved analysis precision and performance
- Detection of Cookie Misconfiguration issues (CWE-613, CWE-614, CWE-1004)
- Detection of Insufficient Certificate Validation issues (CWE-295, CWE-297)
Find out more about the top 5 new features in this blog post.Read More ...
24 Dec 2016 by Johannes Dahse
In this years Advent of PHP Application Vulnerabilities (APAV), we examined 36 critical security issues which were detected in 19 different PHP applications by our code analysis solution RIPS. In our final post, we would like to summarize what we learned during this thrilling advent time. We reveal how the affected vendors reacted to our reportings behind the scenes. Was it right to publish all these sensitive issues? What conclusions can we draw about the security state of PHP applications from our findings?Read More ...
23 Dec 2016 by Hendrik Buchwald
The 23rd gift in our advent calendar presents security issues in e107, a content management system that is in development since 2013. Among others, we identified a critical issue that allows any user to update his permissions and to extract sensitive information from the database by exploiting a PHP object injection vulnerability.Read More ...
22 Dec 2016 by Daniel Peeren
Compliance describes the adherence to regulations and commitments organizations have to fulfill in certain sectors. Security is an integral part of many regulations. In general, a company is compliant if a snapshot of the current security arrangements meets a specific set of requirements. These requirements are defined by several regulatory organizations or standards, for example PCI DSS, HIPAA, or the ISO27k-series. If your company is bound to - or would like to - comply to these standards, read on and learn how the security requirements can be achived with a SAST tool.Read More ...