Russell McOrmond
2006-02-13 03:11:05 UTC
If any FLORA.org people have PHP scripts they should check them for
this problem. If you aren't certain what this is about, and possibly
have a PHP form that sends email, then please ask here for details.
Unlike the AOL problem this is a situation where SPAM is being
generated by our servers because of bugs in PHP scripts.
-------- Original Message --------
Subject: Flaw in PHP scripts abused to send SPAM -- please check scripts...
Date: Sun, 12 Feb 2006 22:02:06 -0500
From: Russell McOrmond <***@flora.ca>
To: Status List <***@list.flora.ca>
The SPAM companies have found a way to abuse broken PHP scripts to
send their SPAM. The mail() function takes parameters which need to be
checked for return or other invalid characters if they come from (or are
built from) external variables (Post/get/etc).
http://ca3.php.net/manual/en/ref.mail.php
You *must* assume that any information received from the network is
suspect and check for things such as this. It doesn't matter what
limits you put on your forms (silly Javascript bounds checking) as they
don't need to use your forms in order to submit data to your PHP scripts.
I have disabled the mail() function on a number of virtual servers
that had broken scripts by changing the sendmail config as follows:
php_admin_value sendmail_path "/bin/true"
--
Russell McOrmond, Internet Consultant: <http://www.flora.ca/>
2415+ Canadians oppose Bill C-60 which protects antiquated Recording,
Movie and "software manufacturing" industries from modernization.
http://KillBillC60.ca Sign--> http://digital-copyright.ca/petition/
_______________________________________________
Status mailing list
***@list.flora.ca
http://list.flora.ca/mailman/listinfo/status
this problem. If you aren't certain what this is about, and possibly
have a PHP form that sends email, then please ask here for details.
Unlike the AOL problem this is a situation where SPAM is being
generated by our servers because of bugs in PHP scripts.
-------- Original Message --------
Subject: Flaw in PHP scripts abused to send SPAM -- please check scripts...
Date: Sun, 12 Feb 2006 22:02:06 -0500
From: Russell McOrmond <***@flora.ca>
To: Status List <***@list.flora.ca>
The SPAM companies have found a way to abuse broken PHP scripts to
send their SPAM. The mail() function takes parameters which need to be
checked for return or other invalid characters if they come from (or are
built from) external variables (Post/get/etc).
http://ca3.php.net/manual/en/ref.mail.php
You *must* assume that any information received from the network is
suspect and check for things such as this. It doesn't matter what
limits you put on your forms (silly Javascript bounds checking) as they
don't need to use your forms in order to submit data to your PHP scripts.
I have disabled the mail() function on a number of virtual servers
that had broken scripts by changing the sendmail config as follows:
php_admin_value sendmail_path "/bin/true"
--
Russell McOrmond, Internet Consultant: <http://www.flora.ca/>
2415+ Canadians oppose Bill C-60 which protects antiquated Recording,
Movie and "software manufacturing" industries from modernization.
http://KillBillC60.ca Sign--> http://digital-copyright.ca/petition/
_______________________________________________
Status mailing list
***@list.flora.ca
http://list.flora.ca/mailman/listinfo/status
--
Russell McOrmond, Internet Consultant: <http://www.flora.ca/>
2415+ Canadians oppose Bill C-60 which protects antiquated Recording,
Movie and "software manufacturing" industries from modernization.
http://KillBillC60.ca Sign--> http://digital-copyright.ca/petition/
Russell McOrmond, Internet Consultant: <http://www.flora.ca/>
2415+ Canadians oppose Bill C-60 which protects antiquated Recording,
Movie and "software manufacturing" industries from modernization.
http://KillBillC60.ca Sign--> http://digital-copyright.ca/petition/