Hackers try to bug PHP programming language in supply chain cautionary tale

Unidentified hackers have tried to plant malicious code in PHP, a programming language used in an estimated 79% of websites. The developers who maintain PHP said Sunday that the attackers likely broke in through a PHP server, and made two “commits,” or attempted changes to the PHP source code. It’s but one example of the supply-chain vulnerabilities inherent in the basic building blocks of popular websites. “While investigation is still underway, we have decided that maintaining our own git infrastructure is an unnecessary security risk, and that we will discontinue the git.php.net server,” Nikita Popov, a software developer who helps maintain PHP, said in a statement. Popov said PHP would move its code repositories to GitHub, an open-source platform for software developers.      Popov did not immediately respond to a request for comment, but told Bleeping Computer that PHP’s maintainers had caught the malicious code before it was introduced publicly […]

The post Hackers try to bug PHP programming language in supply chain cautionary tale appeared first on CyberScoop.

Continue reading Hackers try to bug PHP programming language in supply chain cautionary tale

Attackers tried to insert backdoor into PHP source code

The PHP development team has averted an attempted supply chain compromise that could have opened a backdoor into many web servers. What happened? “[On Sunday, March 28] two malicious commits were pushed to the php-src repo from the names of Rasmu… Continue reading Attackers tried to insert backdoor into PHP source code

Netmask Flaw Leaves Millions Vulnerable While a PHP Git Server is Hacked in Software Supply Chain Attack

We’ve seeing so many software supply chain attacks in recent weeks that it’s hard for us to talk about all of them. But, in the last 24 hours, we’ve seen two major issues that are important for everyone to take notice of:
The post Netmask Flaw Lea… Continue reading Netmask Flaw Leaves Millions Vulnerable While a PHP Git Server is Hacked in Software Supply Chain Attack

How many bytes for password reset token? Should one take steps to hash or conceal raw CSPRNG bytes?

I’m trying to follow the OWASP ‘Forgot Password Cheat Sheet’ recommendations for password reset functionality via email. This requires my server to generate a token. OWASP says that PHP’s random_bytes() and openssl_random_pseudo_bytes() fu… Continue reading How many bytes for password reset token? Should one take steps to hash or conceal raw CSPRNG bytes?