Netcraft: PHP security flaws affect 1 million Web sites
- 04 March, 2002 08:37
About 1 million Web sites are vulnerable to attack through recently discovered flaws in the popular PHP (Personal Home Page) scripting language, Web server information firm Netcraft said Friday.
One million may seem a high number, but it is much lower than the numbers suggested in security warnings that have been sent out this week, Netcraft Director Mike Prettejohn said.
"A system is only vulnerable when PHP is actually used on a Web site, not when it is installed on the server. Current advisories have not made that especially clear," he said.
About 8.4 million Web sites support a vulnerable version of PHP, but only about 1 million of those actually use the scripting language on Web pages, which is what makes them vulnerable, according to Prettejohn.
Several organizations earlier this week warned of the security vulnerabilities in PHP, an open-source scripting language used by many Web developers to create dynamic Web pages. Hackers could exploit flaws in PHP to run arbitrary code on the Web server.
PHP is a project of the Apache Software Foundation, which also puts out the Apache open-source Web-server operating system that is used to run 58 percent of all Web sites, according to Netcraft's most recent Web server survey.
"The large bulk of PHP users is on Apache, it would be less common to run it on another platform. About 38 percent of all the Apache sites have PHP installed. But not all sites use it. For example, hosting companies might make PHP available to their customers, but not everybody uses it," said Prettejohn.
PHP with a MySQL database on an Apache Web server competes with Microsoft Corp.'s ASP (Active Server Pages) with an SQL database on systems running a Microsoft server software product.
Administrators of Web servers with PHP installed are urged to apply the available patches to fix the software flaws or to upgrade to the latest, not vulnerable PHP version, whether PHP is in use or not.
"Everybody will want to apply the patches or upgrade, including administrators who don't run the script. They might one day decide to use PHP (and their system could end up being vulnerable)," said Prettejohn.