Nginx + PHP CGI的安全漏洞:fix_pathinfo

如果你正在使用nginx+php,请关注。

表像:

具体的重现过程,用php代码修改后缀名后上传,比如说www.xxx.com/1.jpg,访问的时候用www.xxx.com/1.jpg/xxx.php

这段jpg代码将会被执行!!!

http://docs.php.net/manual/zh/ini.core.php
cgi.fix_pathinfo “1″ PHP_INI_ALL 从 PHP 4.3.0 起可用 请注意:默认为1


 

为什么会这样呢?

比如, 如下的nginx conf:

  
  1. location ~ \.php($|/) {
  2.      fastcgi_pass 127.0.0.1:9000;
  3.      fastcgi_index index.php;
  4.      set $script $uri;
  5.      set $path_info "";
  6.      if ($uri ~ "^(.+\.php)(/.*)") {
  7.           set $script $1;
  8.           set $path_info $2;
  9.      }
  10.      include fastcgi_params;
  11.      fastcgi_param SCRIPT_FILENAME $document_root$script;
  12.      fastcgi_param SCRIPT_NAME $script;
  13.      fastcgi_param PATH_INFO $path_info;
  14. }

通过正则匹配以后, SCRIPT_NAME会被设置为”fake.jpg/foo.php”, 继而构造成SCRIPT_FILENAME传递个PHP CGI, 但是PHP又为什么会接受这样的参数, 并且把a.jpg解析呢?

这就要说到PHP的cgi SAPI中的参数, fix_pathinfo了:

  
  1. ; cgi.fix_pathinfo provides *real* PATH_INFO/PATH_TRANSLATED support for CGI. PHP's
  2. ; previous behaviour was to set PATH_TRANSLATED to SCRIPT_FILENAME, and to not grok
  3. ; what PATH_INFO is. For more information on PATH_INFO, see the cgi specs. Setting
  4. ; this to 1 will cause PHP CGI to fix it's paths to conform to the spec. A setting
  5. ; of zero causes PHP to behave as before. Default is 1. You should fix your scripts
  6. ; to use SCRIPT_FILENAME rather than PATH_TRANSLATED.
  7. cgi.fix_pathinfo=1

如果开启了这个选项, 那么就会触发在PHP中的如下逻辑:

  
  1. if (script_path_translated &&
  2.      (script_path_translated_len = strlen(script_path_translated)) > 0 &&
  3.      (script_path_translated[script_path_translated_len-1] == '/' ||
  4. ....//以下省略.

到这里, PHP会认为SCRIPT_FILENAME是fake.jpg, 而foo.php是PATH_INFO, 然后PHP就把fake.jpg当作一个PHP文件来解释执行… So…


 

解决办法:
1.修改php.ini中的cgi.cgi.fix_pathinfo为0(即使你在php.ini中没有搜到,也要设置,没有搜到表示默认为1
2.判断文件上传类型时使用严格的判断,至于怎么判断,参见:http://www.54chen.com/php-tech/php-upload-file-types-to-determine-the-complete-program-and-php-nginx-upload-size-and-complete-control-program.html
3.把nginx的判断正则修改为去除/
if ( $fastcgi_script_name ~ \..*\/.*php ) {
return 403;
}

转载自:http://www.54chen.com/php-tech/nginx-php-cgi-of-security-hole.html

http://www.laruence.com/2010/05/20/1495.html

你可能感兴趣的:(PHP,nginx,cgi)