Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

  • Twitter
  • Facebook
  • LinkedIn

Configuration Auditing php.ini To Help Prevent Web Application Attacks

Security and usability do not mix

PHP has a horrible reputation in the security industry based on a long history of vulnerabilities and vendor resistance to fixing them and improving security practices. It suffers from a common problem; the technology is designed to be easy to use, and therefore a high level of security is difficult to achieve. Many who are new to web application programming use PHP, but often do not pay attention to security. In addition poor developer coding practices, PHP itself presents many vulnerabilities in its default configuration even when seemingly harmless coding practice is in use. This leaves a plethora of vulnerable applications, some home grown, many open-source and some commercial. As a result, many of these applications suffer from web application specific vulnerabilities. To give you an idea of just how many PHP specific vulnerabilities there are, I ran some searches on the OSVDB web site. Below are the results:

OSVDB Vulnerability Statistics (Based on Search)

Search Term Results
windows 1046
linux 1066
php 18456
asp 2008

Given the wide attack surface and history of vulnerabilities, organizations need to carefully deploy and monitor PHP applications and build in layers of security. One layer that can be used to improve security is the PHP configuration settings themselves. The php.ini file contains several parameters that allow you to control the behavior of all PHP applications. This blog post describes how some of the popular options can be used to protect your web applications and provides an example of how to audit the php.ini file to ensure your settings match your security policies.

Disable Functions

PHP contains several functions that are known to be vulnerable to command injection attacks. You can add the following line to your php.ini file to prevent these functions from executing (they can still be called, but the calling application will receive an error):

disable_functions = exec, passthru, shell_exec, system, proc_open, popen, curl_exec, curl_multi_exec, parse_ini_file, show_source

With these functions disabled there is a chance that some applications may no longer function correctly. Before implementing this defensive measure I ran the following command on my server to see if any of my applications were in fact using these functions:

egrep -r '(exec| passthru| shell_exec| system| proc_open| popen| curl_exec| curl_multi_exec| parse_ini_file| show_source)' *.php

Depending on your policy, risk evaluation and the importance of the application, you may want to remove the offending application all together. If the application is critical, you can adjust the code to eliminate the functionality or ensure good coding practice to avoid inadvertent remote code execution. If the application is from a third-party, hopefully a patch is available to fix the problem. If there is no patch, sometimes a workaround can be put in place, often involving the php.ini file settings.

Lets look at a "before and after" scenario for an offending application. I setup Mutillidae in my lab, a PHP application that has been written to be insecure by design for testing purposes. It contains a "command execution" vulnerability in the DNS lookup feature. If you enter an IP address, followed by a ";" and an operating system command, the command will execute and the results will be displayed on the page. For example, I entered ";ls" in the IP address field and got the following results:


Nessus was also able to detect this vulnerability during a scan that had the web application tests configured:


Plugin output:

Using the GET HTTP method, Nessus found that :

+ The following resources may be vulnerable to arbitrary command execution:


-------- output --------<br /> &lt;/form&gt;<br /> &lt;pre&gt;<br /> uid=33(www-data) gid=33(www-data) groups=33(www-data)<br /> &lt;/pre&gt; &lt;!-- End Content --&gt;<br /> &lt;/blockquote&gt;

In the plugin output above, we can see that Nessus constructed a query to the web server, that when executed, allowed the "id" command to run. In the output section, Nessus displays the section of the web page that contained the results of our operating system command.

After disabling the vulnerable functions via php.ini modification, we get an error when attempting to execute the attack:


After the php.ini change, Nessus no longer reports this vulnerability as the application has lost the ability to execute operating system commands. Disabling specific functions works really well when trying to secure PHP, however, be certain to check how it will impact all of your applications.

Safe Mode

PHP's Safe Mode provides a similar functionality compared to "disable_functions". When you enable "safe_mode", PHP restricts specific functions and certain types of functionality that could be deemed a security threat. However, there are many ways around these restrictions, as demonstrated in an article by HD Moore titled "PHP Safe Mode Considered Harmful". The other thing to note about "Safe Mode" is that it will not be included in PHP version 6.0. The fact that the PHP developers themselves realized this was not an effective security measure should raise a red flag. However, if you are running a PHP version less than 6.0, having some extra security (if your applications will function) may help thwart certain attacks. In the php.ini file you can turn "Safe Mode" on with the following parameter:

safe_mode = On

File Operating Limits

In most cases there is no reason to allow your web application to read files outside of the web root directory. Typically, web server files are located in a directory such as "/var/www", and each application is installed as a subdirectory. If this is the case, you can limit PHP applications ability to reach outside this directory with the "open_basedir" option:

open_basedir = /var/www

Nessus contains generic CGI tests that will detect the ability to reach files outside of the base web directory:


Once "open_basedir" is set, Nessus will no longer flag this as a vulnerability and you will get the following error when trying to access the vulnerability manually:


Register Globals

"Register globals" is a scary concept that is best described with the following quote from the PHP manual:

"When on, people use variables yet really don't know for sure where they come from and can only assume."

Reference: "PHP Using Register Globals Manual"

Much of programming securely relies on knowing and setting the correct values for your variables. With "register globals" enabled, you may lose control of the value of you variables. This tends to rear its ugly head with respects to session handling.

register_globals = Off

As of version 4.2.0, released April 22, 2002, PHP no longer ships with register_globals on by default.

Allow URLs (or not)

Remote file inclusion (RFI) vulnerabilities allow an attacker to include PHP code from a third-party remote site in an existing page on the target web server. A popular method for exploiting RFI vulnerabilities is having the application call a "PHP Shell", which is a PHP script that provides expanded functionality to upload files, execute commands and perform directory listings. There are two options in the php.ini file that can be set to prevent this from happening:

allow_url_fopen = Off

allow_url_include = Off

Both of the above configuration settings control different aspects of file handling and work to prevent remote file inclusion. Nessus can detect the Remote File Inclusion vulnerabilities as part of the CGI generic tests. When scanning Mutillidae, Nessus finds an example:


With the "allow_url*" options set to "On", it is possible to include PHP code from other sites onto the target page:


When we change the two options to "Off", we get the following error:


In this case it is the “page” variable that is being set to a remote URL and including code from a third party web site. This variable is set using the “include” function within PHP, so the “allow_url_include” directive is preventing the attack.

Magic Quotes

The "magic_quotes" directive represents functionality in PHP that automatically escapes quotes passed from the user to the application. For example, in the following configuration:

magic_quotes_gpc = On

will automatically escape all ' (single-quote), " (double quote), \ (backslash) and NUL's with a backslash for GET, POST and cookies sent. The other magic quotes directive, magic_quotes_runtime

magic_quotes_runtime = On

will escape quotes for a select list of functions. For more information, including a list of the affected functions, refer to the PHP Runtime Configuration Manual. The above settings prevent basic SQL injection from occurring. For example, with the magic quote settings above turned to "Off", Nessus found a SQL injection vulnerability:

Plugin output:

Using the GET HTTP method, Nessus found that :

+ The following resources may be vulnerable to SQL injection:


-------- output --------</p> <p>&lt;form method="POST" action="/mut/index.php?password_confirm=&amp;page= [...]<br /> You have an error in your SQL syntax; check the manual that corres [...]<br /> &lt;/blockquote&gt;<br /> &lt;/td&gt;<br /> ------------------------

In the above output, Nessus has sent a URL to the web application with the "user_name" parameter set to "%27". "%27" is the URL encoded format for a ' (single quote). The resulting page in the "output" section then lists an SQL error, stating that our syntax was incorrect and indicating that we were able to manipulate the web application parameter to run SQL code.

Size limits and logging are two other areas of the php.ini file that contain options that prevent denial of service conditions and control logging. They are not directly related to web application attacks, and therefore not covered here. To read more about these options refer to the OWASP PHP recommended configuration guide.

Auditing your php.ini Config File

Now that we have explored the various settings, their recommended value and the attacks they can prevent, we now need to audit the php.ini files in our environment. Nessus ProfessionalFeed customers can use the configuration auditing features to accomplish this. Available on the Tenable Nessus customer support site is an audit file written to compare your php.ini file against the OWASP PHP recommended configuration. You can find an example of how to configure and run this scan in a previous post titled, "Auditing PHP Settings to OWASP Recommendations with Nessus".


There are many different options in the php.ini file. After rigorous testing and configuration changes, the various settings do affect security in a positive way, often rendering several attacks useless. Command injection, remote file includes and path traversal vulnerabilities can be successfully thwarted by adjusting the settings in the php.ini file. Several of these settings are being deprecated in PHP version 6.0 and later, which means you need to be certain that your applications are implementing security properly and not relying on settings in PHP. You can use Nessus to detect the vulnerabilities in your web applications, using generic testing techniques and audit your configurations to be certain they are in line with your policy. It is important to tune the parameters in your php.ini file to meet your own organizations requirements, and balance security with functionality.


Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning


Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.



Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security


Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try for Free Contact Sales

Try Tenable Lumin


Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.