According to a blog post by the SANS Institute Internet Storm Center (ISC), the PHP vulnerability code can be easily escaped from the site's defenses with the help of a legitimate image from the beginning of a GIF file. 
 
 
The Sans Security blog writes, "This is a smart way to pass the vulnerability code somewhere else, bypassing the network security tools without triggering an alert or attracting attention." ”
 
A malicious attacker could inject a PHP vulnerability code into a graphics file. PHP is a programming language that is often used to open dynamic websites.
 
"Once this type of malicious GIF file is uploaded to the server, it can cause serious damage by remotely deploying more vulnerability codes on the system," said Johannes Ullrich, chief researcher at the SANS Institute. ”
 
When the user downloads and browses the image, the server parses the PHP code and the vulnerability code is executed.
 
Ullrich said that in the past six months, this technology has suddenly occurred mainly on small home sites, more recently on the large Image library site.
 
"Related articles"
 
 
 
 
 
http://www.bkjia.com/PHPjc/446791.html www.bkjia.com true http://www.bkjia.com/PHPjc/446791.html techarticle according to a blog post by the SANS Institute Internet Storm Center (ISC), the PHP vulnerability code can be easily escaped from the site's defenses with the help of a legitimate image from the beginning of a GIF file. SA ...