[Info-vax] Using VMS for a web server

Bill Gunshannon bill at server3.cs.uofs.edu
Wed Jun 10 08:29:33 EDT 2015


In article <ml8kdi$g8a$1 at news.albasani.net>,
	Jan-Erik Soderholm <jan-erik.soderholm at telia.com> writes:
> Simon Clubley skrev den 2015-06-10 02:32:
>> On 2015-06-09, Jan-Erik Soderholm <jan-erik.soderholm at telia.com> wrote:
>>>
>>> OK. That needs a script called wawalo.php already beeing on the server
>>> in a directory where the server can execute it. The exploit is realy
>>> to be able to upload the wawalo.php file in the first place.
>>>
>>
>> Actually what I read it as was that a PHP script installed for a
>> legitimate purpose on the server (as part of, say, a PHP application)
>> had a vulnerability which allowed attacker controlled commands to
>> be executed.
> 
> OK. I read that a file wawalo.jpg was first uploaded, then renamed
> into .php and finaly executed. The only purpose of this file was
> to exloit this PHP "feature", as I understood.

Don't know where you saw that.  Certainly not in my logs.

> 
> But yes, it might also have been a file that was part
> of some application...

Except that as I showed, it seems to work with any random PHP script.
Or maybe it takes a script that uses some particular feature of PHP.
I don't know, I don't reall care.  I have a real job.  Oh wait, only
for 15 more days!!  :-)

> 
> 
>>
>>> If you have a server setup where someone can both upload a random
>>> file and then also execute that file just like that frm the same
>>> directory, you have a severe problem.
>>>
>>> Now, is this a "hole in PHP"? Or could the same thing be done
>>> using any tool that can take an input parameter and execute it?
>>>
>>
>> In this case, I think I would class this as a PHP application
>> vulnerability and not a PHP vulnerability itself.
>>
>> However, speaking as someone who has actually written PHP code, the
>> negative reputation the language itself has in some quarters is well
>> justified.
> 
> Right, I'm in no way defending PHP as such! It's just that this
> was used as an argument against having a web server on VMS. You
> can have that without PHP, if you like.

If you are refering to me, I never intended it to be an argument
against VMS Web Servers.  I was merely pointing it out and really
wondering if the same exploit would work at all on VMS.  The argument
is actually against PHP on anything.

> 
> I'm not even sure that that exploit would work on VMS where
> the scripting processes usualy runs in a restricted user
> context.

So does a script on a Unix box running apache.  But on many webservers
ther eis a thing called SUEXEC that let's local users have scripts in
their web pages that run as themselves.  Sometimes it is necessary for
a web app to write data back.  In the past this required at least one
file with world write privs.  Always a bad idea.  This isn't perfect
but it's better than it used to be.  Although I doubt it gets used much,
if at all, I expect that VMS has the needed functionality to do this too.

bill

-- 
Bill Gunshannon          |  de-moc-ra-cy (di mok' ra see) n.  Three wolves
billg999 at cs.scranton.edu |  and a sheep voting on what's for dinner.
University of Scranton   |
Scranton, Pennsylvania   |         #include <std.disclaimer.h>   



More information about the Info-vax mailing list