PHP Security and YOU - Including files the right way
As a web host we fight the battle against hackers and bad code on a daily basis. So HostNexus is looking to encourage clients to use file inclusion within PHP in a more security conscious and safe manner.
Including files with PHP is a common practice and most usage comes in 2 forms. These are including internal files from your own domain and including files from remote (external) sources. This looks something like:
Both are valid syntax in the PHP world but there are two main problems we see on the servers. Sometimes when you include a file using the the URL of your local domain you can cause a PHP loop that initiates
endless HTTP requests which causes server load issues and even a server crash due to the load. If you want to include files from your local domain you just need to use the server path instead:
And now onto using include() for calling external files:
The main problem with include() is that runs everything through the PHP parser and evaluates code. The main problem comes from setting a variable for include() which can be easily exploited. Here is an example of code in an index.php:
echo " <body>\n";
echo " </body>\n";
The $go variable above is easily exploited like:
The hacker can now execute commands on your files, installing phishing sites, sending spam and stealing data.
If you want to include files from remote domains use PHP's readfile() function instead:
While not 100% secure it still provides more protection as readfile() simply outputs data to a browser rather than parsing everything as PHP.
I emailed about this issue in a recent NewsFlash and the blog post has been up for quite some time. We will be setting allow_url_include to off on all servers from August 1st so please check your code if you use includes and make the easy changes.
Tha's All Folks!
See you all next time.
- Laurence, Head Coffee Maker, HostNexus