wiredmikey writes "On Wednesday, a remote code execution vulnerability in PHP was accidentally exposed to the Web, prompting fears that it may be used to target vulnerable websites on a massive scale. The bug itself was traced back to 2004, and came to light during a recent CTF competition. 'When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives a processed query string parameter as command line arguments which allows command-line switches, such as -s, -d or -c to be passed to the php-cgi binary, which can be exploited to disclose source code and obtain arbitrary code execution,' a CERT explains. PHP developers pushed a fix for the flaw, resulting in the release of PHP 5.3.12 and 5.4.2, but as it turns out it didn't actually remove the vulnerability."
Read more of this story at Slashdot.
- .htaccess
- Austria
- basic web hosting stuff
- Belize
- bug
- caching
- Canada
- CGI
- China
- Computer programming
- Computing
- Cross-platform software
- Denmark
- FastCGI
- Fix Ineffective
- HTTP
- Hungary
- Initialisms
- Islamic Republic of Iran
- ISP
- Japan
- Korea
- Linux
- Lithuania
- Nepal
- Norway
- Philippines
- PHP
- php
- php
- Portugal
- Saudi Arabia
- Scripting languages
- security auditing
- security@php.net
- South Africa
- Sweden
- Template engine
- unsecure web sounds
- Vulnerability
- web context
- web host
- web page developers
- web-facing page
- World Wide Web
- Zero day attack
In June, the UN Human Rights Council declared there should be no discrimination or violence against people based on their sexual orientation. The controversial resolution marked the first time that the Council recognized equal rights of lesbian, gay, bisexual and transgender people. In the same month, New York became the most populous U.S. state to allow gay marriage, in a high-profile victory for gay rights activists. This series of images tracks the status of LGBT rights in 42 nations based on data from the International lesbian, gay, bisexual, trans and intersex association.