Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
PHP Programming Security The Internet

Over 78% of All PHP Installs Are Insecure 112

An anonymous reader writes: Anthony Ferrara, a developer advocate at Google, has published a blog post with some statistics showing the sorry state of affairs for website security involving PHP. After defining a list of secure and supported versions of PHP, he used data from W3Techs to find a rough comparison between the number of secure installs and the number of insecure or outdated installs. After doing some analysis, Ferrara sets the upper bound on secure installs at 21.71%. He adds, "These numbers are optimistic. That's because we're counting all version numbers that are maintained by a distribution as secure, even though not all installs of that version number are going to be from a distribution. Just because 5.3.3 is maintained by CentOS and Debian doesn't mean that every install of 5.3.3 is maintained. There will be a small percentage of installs that are from-source. Therefore, the real 'secure' number is going to be less than quoted." Ferrara was inspired to dig into the real world stats after another recent discussion of responsible developer practices.
This discussion has been archived. No new comments can be posted.

Over 78% of All PHP Installs Are Insecure

Comments Filter:
  • by Marc Nicholas ( 3924913 ) on Tuesday December 30, 2014 @08:04PM (#48700959)
    Well, some therapy should help them overcome their insecurities!
    • Basically the article assumes that everything the PHP team puts out is "insecure" and that Linux distributors have some magic pixie dust that makes it "secure".

      Both assumptions are wrong:

      - First, the latest version of PHP will fix all known security vulnerabilities and will be as secure as those patched by Linux distributors.
      - Second, just because a distribution "supports" a PHP version does not make it any more secure.

      Pure clickbait.

  • by Rufty ( 37223 ) on Tuesday December 30, 2014 @08:05PM (#48700963) Homepage
    22percent of PHP installs are secure???
  • Or, as a php dev would say, "Over 20% are secure. We're making progress, folks"
    • A php dev would probably say 32%.

    • Yep, *sigh* after reading the headline I came looking for a comment like this. I'm a web application developer (LAMP stack and C# .NET MVC depending on where I'm working). In my experience, the kind of people who dis PHP fall in to two categories: generally ignorant or jealous of its success (often former java programmers). I'll address the ignorance: (It is amusing that you blame developers for what in any professional setting is the responsibility of a sysadmin, but that's an aside.) PHP is an astound
  • ircmaxell (Score:5, Insightful)

    by TheNinjaroach ( 878876 ) on Tuesday December 30, 2014 @08:09PM (#48700995)
    I would have never recognized him by the name Anthony Ferrara, but ircmaxell immediately rings a bell for me. That dude is smart, kind and helpful in situations on IRC where most people aren't. He took a lot of time helping me get a patch or two submitted and accepted into PHP, in spite of my rudimentary git submissions.

    If you're reading this ircmaxell, thanks for the help. The PHP Project is better for it.
  • by gbjbaanb ( 229885 ) on Tuesday December 30, 2014 @08:14PM (#48701031)

    to assume every web server is hacked already.

    Seriously, if you assume this, and code your way in a more secure, 3-tier manner, with a separate, and secured, application server, then you will mitigate all the problems with an insecure web server - well, at least they won't have full unfettered access to your database.

    This may mean giving up those "all in one" frameworks people so love (whether its PHP or .NET or any other language), but that can only be a good thing - write an app server with a secure API isn't so hard to do, but will mean your CEO won't have to appear on the news explaining why every user of his site needs to change their password and replace their credit cards.

    • Apparently gbjbaanb has never heard of a man in the middle attack.

    • Seriously, if you assume this, and code your way in a more secure, 3-tier manner, with a separate, and secured, application server, then you will mitigate all the problems with an insecure web server

      For PHP web applications that aren't yet quite popular enough to need even a single dedicated server, is there a way to see some of the benefits of "a separate, and secured, application server" without tripling the budget?

      • Depends - if you're running on a shared webhost for $5 then you'll have more issues than cost to deal with - reliability and performance for instance.

        But you don't need full-on dedicated servers where the DB is completely disconnected from the web server, if you are just trying to mitigate the issue of an insecure front-end, then simply running the rest of the system secured from each other with different user accounts and a application layer running as a service (written n something else) will provide you

      • Depends on how big your initial budget is. If you're running PHP web apps that are so lightly hit that you can't warrant provisioning a dedicated server instance or PC for them, use a Pi or BeagleBone or similar low powered/cheap option. If you're getting more traffic than 2 or three BB's in a cluster can handle, maybe you should look into a cheap VPS. There are some that provide more than enough power to run a site for less than $10/mo per instance. For my own low end hobby needs a basic VPS at Centarr [centarra.com]
        • by tepples ( 727027 )

          the power and bandwidth requirements are both miniscule as well as incidental (need the electricity and internet at the house anyway).

          Unless your ISP doesn't let you run a web server at home. Some ISPs threaten to disconnect residential customers that receive a large amount of inbound traffic. Other ISPs, especially those using a microwave last mile (such as cellular or satellite) and those in areas hit hardest by the IPv4 address shortage, put their users behind a carrier-grade NAT and don't forward ports to subscribers. And even if they did forward non-well-known ports, alternate ports confuse end users because HTTPS and HTTP user agent

          • Who's running a web server at home? Granted my ISP provides me with full incoming and outgoing capability without blocking ports, provided I don't break my bandwidth limits... my bones are not running web servers; 2 are running as NAS serving through ssh and one is a MaraDB server with port forwarding handled by the Cisco Router provided by Cox. The bone running MaraDB also checks the public IP twice a day and will forward an email to me if it changes so I can go into Centarra (who's also running my DNS z
            • by tepples ( 727027 )

              The web server is on my Centarra Instance out in the cloud, and it's making the direct calls to the home network that run the apps

              That's the problem. If you're behind NAT, your web server instance can't connect to your application and database servers on your home network.

              • I'll give you a hint: In Linux, everything is a file that can be read from with the right permissions... Including an incoming ssh session tunnel coming from servers set up behind a NAT. Scripts can be built that automate connections and the tunnel can be used as the encrypted pipeline for your web apps to funnel needed backend data through.
  • PHP (Score:5, Insightful)

    by ledow ( 319597 ) on Tuesday December 30, 2014 @08:23PM (#48701079) Homepage

    And why?

    Because upgrading PHP breaks shit. It's the old story of backwards compatibility versus security and, inevitably, when you've commissioned a website in a language that you can't program in yourself, you will choose backwards compatibility every time.

    Most people do not host their own web services. As such they are at the mercy of their host and what their host needs to run for everyone to be happy.

    Every web host I've ever used, personally or professionally, will give you a version of PHP and rarely update it. When they do, they will invariably warn you that your scripts (i.e. website) are probably about to break. Most people in that position do not have the skills and knowledge (or even the tools or hosting capability!) to log in and fix the problem. So it's "we're going to break your website... you have to pay money to fix it".

    Hence, there is a pushback every time they do it, and that makes them even more reluctant to suggest to their users that they need to do it again next month.

    This is partly a user problem, yes, but it's mainly in the court of the PHP developers. Why does going from PHP 5.3 to 5.5 break SO MUCH without reason? Almost every bulletin board, forum, image gallery or what-have-you you find that runs PHP tells you version it will work on, and has had to issue at least one update that fixes shit that breaks on the newer versions of PHP.

    I'm not sure there's another language out there that's quite so undefined and variable when it comes to how things should work and what could change/break in new versions.

    Sure, I get that we have to keep everything up-to-date when we're running net-facing servers, but the problems of PHP compatibility and that most web-hosts are scared to upgrade has caused more problems than those old scripts still running. For the most part, they are even worked around so they are still compatible with old PHP's rather than, as should happen, upping the minimum required PHP version and making people get secure throughout.

    I think we can safely lay the majority of this problem on the removal of register_globals (something that should never have existed in the first place), magic quotes and safe mode. The last two of which were touted as the lazy-man's security functions so you didn't have to worry about all the fine detail. The rest of the changes in those versions are pretty minor and to-be-expected of a new version of software.

    If PHP hadn't done a "PHP isn't safe", "Here, use this hodgepodge of half-assed security feature", "Shit, they're more dangerous than what we were avoiding, remove them!", then maybe they wouldn't be in this mess.

    • Seems like you put a lot of thought into this but you're frankly wrong. Wordpress didn't exist until years after "register globals" got deprecated. I agree it should never existed in the first place, but Wordpress is insecure entirely without any help from "register globals."

      • Re:PHP (Score:5, Informative)

        by ircmaxell ( 1117387 ) on Tuesday December 30, 2014 @09:04PM (#48701275) Homepage
        Ummm... No. WordPress was first written in PHP3. Before it was even called "register globals". Back when that was just how you did things.
        • by Yakasha ( 42321 )

          Ummm... No. WordPress was first written in PHP3. Before it was even called "register globals". Back when that was just how you did things.

          Wordpress 0.7 was first released in 2003. Register globals was first disabled in PHP 4.2 in 2002. So, yes, register globals was deprecated (though it did not throw a warning until later) before Wordpress was released. As PHP 4.0 was released in 2000, a full 3 years before Wordpress, I even question the PHP3 claim (well, I question their reasoning for developing a new product on PHP 3).

          As a PHP developer at the time, I also dispute the claim that register globals was "just how you did things", in 2003.

          • by Yakasha ( 42321 )

            As a PHP developer at the time, I also dispute the claim that register globals was "just how you did things", in 2003.

            Nah, thinking back some more... At least one job did still use PHP 3 in 2002... So, ya, I'll retract this statement. Many people did still use it, and 4.2.0...

      • Re: (Score:3, Informative)

        by pspahn ( 1175617 )

        Wordpress is widely adopted. Very widely. The #1 reason it is insecure is because it is targeted so often.

        Is that PHP's fault?

        Along with WP, plenty of other platforms plainly store their database credentials in some config file. It might be PHP, maybe XML, maybe JSON ... irrelevant. The credentials are stored in plaintext on the server.

        Is that PHP's fault?

        All these platforms do things in their own way. I'm a Magento developer and it is a platform that is notorious for it's complexity. I understand it pr

        • Re:PHP (Score:4, Insightful)

          by dgatwood ( 11270 ) on Tuesday December 30, 2014 @10:42PM (#48701791) Homepage Journal
          Wordpress is widely adopted. Very widely. The #1 reason it is insecure is because it is targeted so often.

          No, the #1 reason it is insecure is that it isn't secure. The #1 reason it looks insecure is because it is targeted so often.

          Along with WP, plenty of other platforms plainly store their database credentials in some config file. It might be PHP, maybe XML, maybe JSON ... irrelevant. The credentials are stored in plaintext on the server.

          There's nothing wrong with doing that. The database shouldn't be accessible from arbitrary machines anyway, so having the credentials buys an attacker nothing. Besides, how the heck else are you going to provide credentials to a script? No, the real problems are that:

          • Many servers are misconfigured so that any Tom, Dick, or Harry can access the database and wreak havoc after they manage to steal those credentials.
          • Many web servers are misconfigured so that it isn't possible to allow the script to access those config files without allowing other unrelated users to access them.
          • Many shared web servers are misconfigured in ways that allow PHP scripts owned by other users to access those same files, with no way to prevent that access.

          All of these fall under the category of sysadmin configuration mistakes, not flaws in the software, per se, though in some cases, the software may create files with poor permissions (or in an insecure way, allowing for race condition attacks) that exacerbate those problems.

          All these platforms do things in their own way. I'm a Magento developer and it is a platform that is notorious for it's complexity. I understand it pretty damn well, but the majority of the code I see was clearly written by folks who don't understand it very well. I've seen /www/var/log left wide open and the justification was that /www/var/log doesn't contain anything important. Just errors and stuff like that. For those paying attention, what's the difference between Mage::log($order, null, 'orders.log') and Mage::log($order->debug(), null, 'orders.log')? If you said, "the first one will log the entire object -- including database credentials", you get a cookie.

          To some degree, that points to the need for both better logging systems and better back-end software design. When I'm writing code, I'm very careful to explicitly have separate debug levels, with explicit comments about the security or insecurity of each of those levels. Those security-risky debug levels are turned on only for short periods of time while fixing authentication-related bugs, and any secret info goes into a separate log file in a location outside the web root so that you can't trivially access it by making requests to the server itself—and never to a syslog daemon (whose log files are potentially readable by other users on shared hosting systems).

          I also segregate user credentials into separate objects/variables. With the exception of the numeric user ID itself, none of that info is ever used outside of my authentication and authorization code, which is segregated into separate files to avoid accidental disclosure. Thus, none of the authentication information ever appears in any object that could realistically get logged. The obvious exceptions are objects associated with the database, which ostensibly contain database auth information, but I'm never going to print_r a database connection object (assuming that's even possible), so that's mostly moot.

          The number of "insecure" PHP sites is probably much closer to 100% than advertised, but it usually isn't PHP's fault.

          Actually, it is probably much lower, for several reasons:

          • OS X v10.9 gets regular security updates, and ships with a version lower than the version they list. However, Apple routinely patches the software that they ship (rather than updating it) when security vulnerab
    • Re: PHP (Score:2, Interesting)

      by Anonymous Coward

      I've programmed heavily in both PHP and .NET and I can say the PHP upgrades are not the cause of security issues. PHP's weakness is a combination of being interpreted at runtime and not enough access to the kernel. Things break heavily between .NET versions yet those developers do not jump ship over it. As PHP moved towards being more object oriented the implementation of it changed. Code which ran in a safe manner previously all of a sudden is a security problem. In .NET things are structured so that in th

      • Re: (Score:2, Interesting)

        by Anonymous Coward

        This.

        Old php3 / php4 dev here. Moved to python when got the chance.

        I think that one of the main reasons for not updating PHP on production arises from its interpreted nature, and some other come from the language itself. First, there is no mechanism to know if an application will work with a new version of the interpreter before running into production. You may say your test coverage is nearly complete, but: a) that leaves some code untested, and b) most of the php apps I've found have zero tests. Then, you

        • by Anonymous Coward

          First, there is no mechanism to know if an application will work with a new version of the interpreter before running into production. You may say your test coverage is nearly complete, but: a) that leaves some code untested, and b) most of the php apps I've found have zero tests.

          Why would someone with zero tests day they have nearly complete test coverage? And why would anyone just throw up their hands, say "testing is impossible," and just implement straight to production? You sound like a PHP developer

    • Re:PHP (Score:5, Insightful)

      by Trane Francks ( 10459 ) <trane@gol.com> on Tuesday December 30, 2014 @10:55PM (#48701857) Homepage

      There is a lot of angst here, but the reality is that putting a CMS online is not the end of the task, it's the beginning. If you want to have a public-facing web site, that means keeping it up to date so that providers have no qualms about upgrading. In many cases, the issue isn't the client, per se, but the requirements of the client site that slow down upgrading. As an example, Zend still hasn't managed to add PHP 5.5 support to their Guard product, so anybody who has clients using Zend in their sites will be stuck on 5.4.x till, well, whenever Zend gets a move on.

      In any case, running a provider is a matter of pushing clients to keep up with server changes in a timely yet forgiving fashion. There's no reason that upgrading from PHP 5.4.35 to 5.4.36 should break ANYthing, so there's no excuse for a provider to not keep up with patch releases. Moving from 5.4 to 5.5, for example, will introduce potential incompatibilities, so providers need to give 30-60 days advanced notice to ensure client sites can be checked and upgraded as required. As long as plugins and CMS releases have been updated as they come along, the reality is that most upgrades are pretty painless. It's the big-jump scenario, 5.2-5.5 kind of upgrade that will be a nightmare. Those should never happen.

      A good provider will retain legacy servers for those who still toddle along with FrontPage extensions and the like, but only till such time as the base services, e.g., Apache 2.2.x and PHP 5.4.x reach end of life. At that point, a provider needs to come to the realization that putting an entire server at risk at the behest of a few clients who are slow with the updates is bad business. PHP might have its downside, but keeping in tight lockstep with upgrades keeps things (usually/hopefully/OMG-I-pray) one step ahead of the kiddies and blackhats.

    • by Tablizer ( 95088 )

      Why aren't there "long-term support versions" similar to what Ubuntu offers? Only security flaws are patched in such versions. However, I realize patching security flaws can break existing software also, but if you only patch security flaws rather than add and change features for the line, the magnitude of problems from updates would be smaller.

      • Why aren't there "long-term support versions" similar to what Ubuntu offers? Only security flaws are patched in such versions.

        Ubuntu only supports a handful of packages, specifically those in the main and restricted sections of the package archive. This includes the main php5 package but a large number of modules are kept in universe and are not supported at all.

        However, I realize patching security flaws can break existing software also, but if you only patch security flaws rather than add and change features for the line, the magnitude of problems from updates would be smaller.

        It depends on the vulnerability. I had things break when the bash vulnerability was patched some time ago. There is no solution other than test that things work before you apply the update.

        • by Tablizer ( 95088 )

          I meant Ubuntu LTS distro's directly (as an example), not Php in their distros.

          And while I agree that security patches will probably always break some stuff, it's still the lessor evil compared to full upgrades (features & security).

    • <quote>Because upgrading PHP breaks shit.</quote>

      Like upgrading from Python v2 to v3?


      • No. It was announced loud and clear that going from Python 2.x to 3.x would require changes.

        I never had a problem with Python 2.x -> Python 2.x or Python 3.x -> Python 3.x

        you PHP shills just don't get how bad PHP sucks balls.
    • Every web host I've ever used, personally or professionally, will give you a version of PHP and rarely update it.

      And every web host I've ever used long enough to notice has updated PHP and then you have to go into cPanel to change the version you're using. Perhaps your hosting companies were doing the same, and you simply failed to notice.

  • PHP coder since before 4.x. All the bad stuff started happening when people started using redistributed PHP frameworks.

    • by pspahn ( 1175617 )

      Do you imply that redistributed PHP frameworks are the problem. In 2015, do you have some alternative suggestions?

      I feel like you're saying it would be a great thing if everyone went back to CFML, because you know, hey, it's great having to pay for all your software tools. Of course freely distributed software is going to cause "bad stuff" to happen. I'm pretty sure licensed software isn't immune, either, it's just a different flavor of "bad stuff".

      You make a great point, don't get me wrong, it's just tha

      • You realise there are loads of us who spend our time in "work week land" happily getting on with shit using .Net, ASP.Net MVC and other .Net frameworks (I currently heavily use NancyFX) and earn money while having a great time doing it? And up until 2008 I was a full time PHP developer, but you won't ever see me going back to PHP now, its just not worth putting myself through that pain and suffering.

        So, dismissing ASP.Net out of hand, seemingly simply because you dont like it, limits your options for no go

  • by grub ( 11606 )

    I guess the Perl-loving neckbeards at /. were right all along.
  • If someone can explain, I don't understand why he is mapping to Linux distros. The W3Techs.com site just give the distribution of various versions of PHP and the percentage of these. I just did a spreadsheet using only the numbers from W3Techs.com and I am getting something like: 27.1% secure and 72.9% unsecure. Not that is a big difference, however it evades me why he is mapping everything to a Linux distro given many distros are missing in his analysis. Any hints?

    • Re:Why the distros? (Score:5, Informative)

      by ircmaxell ( 1117387 ) on Tuesday December 30, 2014 @09:07PM (#48701287) Homepage
      The point most people make when you talk about running old versions is that "well, distributions backport security fixes, so 5.3.3 is secure on distro XYZ".

      So, to get around that, I looked at the popular distro's versions that they maintain. Then I counted *all* of those point versions as secure (over counting). So 5.3.3 is insecure as distributed by php.net, but as installed by Debian 6 it is secure.

      So therefore to get an upper bound (rather than lower bound) on secure versions, you need some way of factoring in for distro support.

      So I picked the most popular distros for server usage. Is this hand-waving? Absolutely. But it should give a pretty reasonable upper-bound.
      • Ah! Thanks for the clarification.
      • "well, distributions backport security fixes, so 5.3.3 is secure on distro XYZ".

        Are you aware of any analysis as to the extent that is actually true, ie for distro X or Y which patches really have been backported and which are skipped?

        I had a quick poke about the W3Tech site and couldn't really see much of their methodology, especially in terms of how they identify PHP usage and what version is being used. I'd have though that if you looked at their PHP page [w3techs.com] there should be a not insignificant number wh

        • Are you aware of any analysis as to the extent that is actually true, ie for distro X or Y which patches really have been backported and which are skipped?

          Yes. For most CVEs, the major distributions do backport fixes. They don't however backport all security fixes.

          For example, there was a bug in crypt's bcrypt implementation which would cause collisions for certain classes of passwords (specifically those with characters with high bits set). The fix in 5.3.6 was to add a check into the normal $2a$ imp

    • I think he is trying to show that the distros are doing a poor job in ensuring that insecure versions are not getting frozen in thier distributions.
  • by Anonymous Coward
  • not surprising at all
    over at LinuxQuestions we had a rash of

    H E L P ! ! !
    I just installed RHEL6.0 ( unlicensed !!!)
    i just installed Fedora 12 ,or 13,or14 ( fedora 21 is current)

    and !! NO KIDDING !!!
    i just installed RH7.2 ( the rh7.2 from 1996 )
    and
    i just installed RH9 ( from 2001 )
    and a few
    "i just installed RHEL4.0 " ( RHEL 7.0 is current)

    and this was only in the redhat family

    • Time traveler problems.

    • I'd wager a lot of it is school assignments. School courses are rarely kept up to date with the current distros. I can't blame them for not keeping up with the latest Fedoras, but at least they should be running a supported enterprise release (i.e. RHEL6, but encourage them to use CentOS).

      I see a lot of the "I am trying to install Fedora 10 but it won't work". Of course it's normally because the package repositories have been archived and the default install can't find them. When asked why they are usin

    • by ihtoit ( 3393327 )

      I just installed OpenSUSE 13.2 on a VM with 2GB RAM assigned, installed using the network image. EVERYTHING worked. I mean EVERYTHING. All my devices, mapped shares, the lot.

      The fuck did I do wrong?? Usually when I install $NT, I have to spend the next six hours dicking around with system updates, device drivers and application licence keys.

  • Given how abysmal PHP is as a language, it seems completely consistent that an overwhelming percentage of the deployed systems are security failures. PHP seems to breed incompetence.
  • What he's saying is that the only "secure" version of something is x.x, x.y, z.x. Anything else is "insecure."

    Well fuck, what about all those XP installations? Default apache configs? Systems using heartbleed SSL? What about if they're hosted on platforms that aren't current? What about embedded platforms?

    Basically, 99% of the internet is insecure.

    I mean, come on: 82.27% of perl installs are secure? 77.59% of python installs? Get real.

    • I mean, come on: 82.27% of perl installs are secure? 77.59% of python installs? Get real.

      No. 82.27% of all PERL installs have no known vulnerabilities in PERL itself.

      This isn't to say the code on top is secure. And it isn't saying that it's exploitable. Just whether known vulnerabilities in the platform itself exist.

      • by guruevi ( 827432 )

        What's relevant is whether or not
        a) your code uses the insecure portions of the language
        b) the security vulnerabilities are remotely exploitable
        c) you have not used a workaround

        A lot of vulnerabilities within PHP are "if you have a PHP install on the same host that shares a common PHP instance" or "if you do these things in this particular way". I don't think there are a lot of vulnerabilities of the sense that it will drop down to a terminal if you send a special packet to the website.

        • Re:Bogosity (Score:4, Interesting)

          by ircmaxell ( 1117387 ) on Tuesday December 30, 2014 @09:56PM (#48701533) Homepage
          There's a difference between a vulnerability and an attack vector. Even if it's not exploitable, the vulnerability still exists.

          However, I would like to make a point. How many of these installs made a conscious decision by investigating the security fixes and balancing that against their codebase to see if it's exploitable or not? I'd wager that the number is so small as to not even register.

          Besides, I think a variant of Schneier's law applies:

          "any person can invent a security system so clever that she or he can't think of how to break it."

          The same thing applies to vulnerabilities: If you can't think of a way to exploit it, that doesn't mean it isn't exploitable.

          So yes, it is an over-statement. But it's also showing quite clearly how updates are being dealt with. And that was the precise point of the original post. If it gets people to think about upgrading more, then awesome. If not, nothing lost.

  • I just deployed a secure PHP install for my new blog. Please adjust the numbers to reflect this since those numbers are allegedly for all installs.

  • And who cares?
    I don't have anything that requires security or matters in PHP. I never would, it's just kind of a crappy scripting language to me.
    I've PHP that does "Stuff" but none of it is handling private data or writing to databases. At best it's manipulating the data after it's arrived locally and displaying it. Or manipulating it in a form or something before delivering it. I supose it could alter the users intent on send, but I don't care. I'd treat them as untrusted anyways, they're just as likely to

  • Our company runs our own servers; we run Ubuntu Linux. Our web sites are PHP. All I know is to run apt-get every Sunday and Ubuntu can update whatever it wants to. These are in-company web sites with login user names and passwords. No e-commerce involved; no public involved.

    Am I a security export? Hell no. I've been programming for 45 years. My first language was FORTRAN; my first "personal computer" was a 360/20.. If it takes a security expert to code a program today than our industry is fundamentally flawed.

    • Our company runs our own servers; we run Ubuntu Linux. Our web sites are PHP. All I know is to run apt-get every Sunday and Ubuntu can update whatever it wants to. These are in-company web sites with login user names and passwords. No e-commerce involved; no public involved.

      In case you ever run a public Ubuntu-based server make sure that you never install packages from the universe or multiverse components of the package archive. They are not updated by the Ubuntu security team and can therefore include unpatched vulnerabilities, which include a large number of php5 packages.

      • Thank you very much. I have added your post to our site documantation.
      • Thanks. Will do. But ,,,
        I can use dpkg-query to see the names of the packages which are installed on our server. But how do I tell what component of the package archive that package comes from? What comes from "universe"; what comes from "mulltiverse"? The only thing I know of that tells me that is the Synaptic Package Manager, and of course we have no GUI on our servers.

        Thanks.

  • by CODiNE ( 27417 ) on Tuesday December 30, 2014 @10:08PM (#48701591) Homepage

    Why is it that 5.3.10 is listed as the last secure PHP 5.3 when there's many more releases after it?

    • The 5.3 branch is end-of-life. Meaning that the latest release (5.3.29) has known vulnerabilities that weren't fixed. Therefore, it's not secure.

      5.3.10 is listed as secure by the post because that version is supported by Ubuntu 12.04...
  • since most people use web hosting companies some who take time to update their servers there needs to be a dedicated campaign focusing on these guys to shape up.
  • On lots of servers the version number is hidden, so they can't be included in these statistics. My guess is that administrators who know that the version number should be hidden on a production server also update PHP more (or automatically). In that case the conclusion of this post is very doubtful.
  • by plopez ( 54068 ) on Wednesday December 31, 2014 @10:59AM (#48704925) Journal

    I have never heard of a developer held responsible for failures. EEs, CivEs, ChemsEs, etc have to carry malpractice insurance to work.Until they can be sued and held responsible they will not be responsible.

    That is why Software Engineering, IMO, does not exist. At best developers are skilled workers but not engineers.

  • The problem is that PHP is just one piece in the entire stack. Updating PHP will often require fixing the ini file. Updating the web server will require fixing the web server config files. Updating the database might require fixing PHP's ini and fixing the database config. And if there are any other parts in the mix it will be even worse. What is missing is a simple means to update the entire stack and transfer the customizations in the configuration files. Even experts like Apachefriends all but abandoned
  • WordPress and Drupal are listed separately...as if both are not using PHP! Looks as if someone cooked up the stats just to blame PHP. I don't get why PHP is always used as whipping boy often using bogus arguments.

As the trials of life continue to take their toll, remember that there is always a future in Computer Maintenance. -- National Lampoon, "Deteriorata"

Working...