December 30, 2016 By Mark Samuels 2 min read

Security specialists have unearthed three fresh PHP vulnerabilities that could have serious consequences for organizations and consumers worldwide.

Yannay Livneh, a member of the exploit research team at Check Point, said in a blog post that his group spent several months analyzing the potential for PHP vulnerabilities in web programming language PHP 7. Through this research, the security team discovered previously unknown vulnerabilities that cybercriminals could have used to spread malware and steal data.

Livneh’s team reported the findings to PHP, and the organization’s security team produced vulnerability fixes. IT security managers must now ensure their business’s web servers are running the latest version of PHP 7.

What Is PHP 7, and Why Is It Being Targeted?

PHP 7 is the latest release of Hypertext Preprocessor, a widely used open-source web programming language. Estimates suggest the language runs more than 80 percent of websites on the internet. In comparison to its predecessors, PHP 7 offers a range of benefits, including higher performance and improved functionality. Progression to the new version of the development language continues at pace. Recent research from tools producer Zend suggested only 14 percent of users have no plans to move to PHP 7, according to CIO.

However, Livneh suggested that PHP 7 also presents a new avenue of attack for cybercriminals, who can use the opportunity to discover vulnerabilities.

How Could the PHP Vulnerabilities Create Problems?

The first two vulnerabilities would give cybercriminals the opportunity to control a website and create mayhem, such as spreading malware or stealing customer data. The third vulnerability would create a denial-of-service (DoS) attack that exhausts memory and shuts the website down.

The good news is that there is no indication that these new vulnerabilities have already been exploited, Livneh told SC Magazine. The even better news for IT managers is that patches for the PHP vulnerabilities have already been issued. The Check Point research team reported the three vulnerabilities back in August and September. PHP security specialists provided updated versions of the programming language in mid-October and at the start of December.

Why Did These Concerns Emerge, and Is PHP 7 Business-Ready?

Livneh and his research team focused their analysis on what is known as the “unserialize mechanism,” which is an area that was heavily exploited by cybercriminals in PHP 5. While the same mechanism was again the root of the concern, the vulnerability in PHP 7 was different in form to that in PHP 5.

The exploit associated with PHP 5 allowed hackers to attack high-profile platforms and websites, including those built on Drupal. The patches to PHP 7 should provide a sense of calm for security managers, although it should be noted that some reticence to adopt the new version of the programming language remains.

The Zend research discovered that a range of factors dissuade PHP 7 laggards from migrating, including incompatibility with custom code (31 percent), deficiency in terms of support (17 percent) and scarcity of extensions (11 percent).

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today