SlideShare a Scribd company logo
The weak points in our systems
Are your dependencies getting you down?
Thomas Shone – Senior PHP Developer
PHP South Africa - Oct 2013
Copyright © 2012 Clickatell. All rights reserved.
About me
 Senior developer for Clickatell
 Work remotely from Grahamstown in the Eastern Cape
 I like to break things
Copyright © 2012 Clickatell. All rights reserved.
The bare minimum we SHOULD be doing
 Preventing SQL injection and sanitizing user input
 Email and cellphone verification
– Mitigate social engineering against support team
 Salting and using strong hashing for passwords
– As of PHP 5.5, www.php.net/password will make this trivial
 Forgotten password resets done by email link
 Use OAuth or OpenID
 Two factor authentication
– High risk data
– Premium support verification
– Off-site staff authentication method
Copyright © 2012 Clickatell. All rights reserved.
What the blogs haven't warned us about
 No coder is an island
 We all rely on:
– 3rd party libraries
– Frameworks
• Symfony
• Zend
– CMS packages
• Joomla!
• Wordpress
– E-Commerce software
• osCommerce
• Magento
– CRM software
• SugarCRM
Copyright © 2012 Clickatell. All rights reserved.
So... time to come clean... I've done it too
 Perception
– Using a version of Smarty without vulnerabilities (3.1.12)
 Reality
– 4 versions of Smarty.
– Version 2.6.26 with 11 Vulnerabilities (7 critical)
– Version 2.6.28 with 12 Vulnerabilities (7 critical)
– Version 2.6.11 with 12 Vulnerabilities (7 critical)
 The other three were dependencies of another front end
system
 Developers had not updated Smarty since 2009 (the version
they are using was released in Dec 2005)
Copyright © 2012 Clickatell. All rights reserved.
Lets get some real world data
 43 popular open source web applications, libraries and
frameworks.
 3,421 versions
 5.6 million files
Worst offender
Copyright © 2012 Clickatell. All rights reserved.
Some graph explanation
Mean / Average
Median
The Doom Line
Insert the title of your
long presentation
names here
Enter your subtitle here
Some actual numbers please
What are SMBs using?
Copyright © 2012 Clickatell. All rights reserved.
Where does the blame lie?
 Wordpress and Joomla!
– Highly popular = Highly targeted.
– Fix released before the vulnerability disclosed
 Libraries not so well behaved
– Most of the libraries found where vulnerable
– OpenX had a backdoor in their code base
 Frameworks came off well
– No vulnerabilities for the versions found
Reference:
http://blog.sucuri.net/2013/08/openx-org-compromised-and-downloads-injected-with-a-backdoor.htm
Insert the title of your
long presentation
names here
Enter your subtitle here
Lets get a little ageist here
Insert the title of your
long presentation
names here
Enter your subtitle here
What's the sell by date
Insert the title of your
long presentation
names here
Enter your subtitle here
Lets just put those together
Copyright © 2012 Clickatell. All rights reserved.
Some good news at least
 We were looking at the worst of the worst
– SMB with little technical knowledge
– Freelancer CMS deploy
 People will fix what they know is broken
– Growing awareness
– Emergence of auto update tools
– Software houses and freelances, up-sell those maintenance
contracts
Insert the title of your
long presentation
names here
Enter your subtitle here
How much has the situation improved
Copyright © 2012 Clickatell. All rights reserved.
And for the developers
 Means of distributing 3rd party code is improving
– Composer
• Don't commit dependencies... specify
• Major release locking
• Simple update mechanism
@thomas_shone
www.shone.co.za
Questions?

More Related Content

PPT
A Slide!
PPTX
Wordpress podcamp2011
KEY
Why Switching To WordPress 3.0 Is The Best Thing You Can Do For Your Clients
PPTX
Installing WordPress The Right Way
PPTX
WordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
PPTX
Practical Blogs for Writers
PPTX
Speed & Uptime with Wordpress
PDF
Identifying a Compromised WordPress Site
A Slide!
Wordpress podcamp2011
Why Switching To WordPress 3.0 Is The Best Thing You Can Do For Your Clients
Installing WordPress The Right Way
WordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
Practical Blogs for Writers
Speed & Uptime with Wordpress
Identifying a Compromised WordPress Site

Similar to PHP SA 2013 - The weak points in our PHP projects (20)

PPTX
2018 Hacked Website Trends
PDF
Web Security
PPT
SoftwareSecurity.ppt
PDF
My tryst with sourcecode review
PPT
香港六合彩
PPTX
Open Source Security
PDF
ZendCon Security
PDF
Secure PHP Coding
PPTX
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
PDF
WhiteHat 2014 Website Security Statistics Report
PPT
Secure SDLC for Software
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
DOC
Joomla web application development vulnerabilities
PPTX
Identifying & fixing the most common software vulnerabilities
DOCX
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
PDF
Make it Fixable (NDC Copenhagen 2018)
PDF
Make It Fixable (Sikkert NOK 2017)
PDF
11 PHP Security #burningkeyboards
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
2018 Hacked Website Trends
Web Security
SoftwareSecurity.ppt
My tryst with sourcecode review
香港六合彩
Open Source Security
ZendCon Security
Secure PHP Coding
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
WhiteHat 2014 Website Security Statistics Report
Secure SDLC for Software
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Joomla web application development vulnerabilities
Identifying & fixing the most common software vulnerabilities
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Make it Fixable (NDC Copenhagen 2018)
Make It Fixable (Sikkert NOK 2017)
11 PHP Security #burningkeyboards
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
Ad

More from xsist10 (11)

PDF
Security theatre (Scotland php)
PDF
Security Theatre (PHP Leuven)
PDF
Security Theatre - Confoo
PDF
I put on my mink and wizard behat - Confoo Canada
PDF
Security Theatre - PHP UK Conference
PDF
Security Theatre - Benelux
PDF
Security Theatre - AmsterdamPHP
PDF
I put on my mink and wizard behat (talk)
PDF
I put on my mink and wizard behat (tutorial)
PDF
I put on my mink and wizard behat
PDF
PHP SA 2014 - Releasing Your Open Source Project
Security theatre (Scotland php)
Security Theatre (PHP Leuven)
Security Theatre - Confoo
I put on my mink and wizard behat - Confoo Canada
Security Theatre - PHP UK Conference
Security Theatre - Benelux
Security Theatre - AmsterdamPHP
I put on my mink and wizard behat (talk)
I put on my mink and wizard behat (tutorial)
I put on my mink and wizard behat
PHP SA 2014 - Releasing Your Open Source Project
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx

PHP SA 2013 - The weak points in our PHP projects

  • 1. The weak points in our systems Are your dependencies getting you down? Thomas Shone – Senior PHP Developer PHP South Africa - Oct 2013
  • 2. Copyright © 2012 Clickatell. All rights reserved. About me  Senior developer for Clickatell  Work remotely from Grahamstown in the Eastern Cape  I like to break things
  • 3. Copyright © 2012 Clickatell. All rights reserved. The bare minimum we SHOULD be doing  Preventing SQL injection and sanitizing user input  Email and cellphone verification – Mitigate social engineering against support team  Salting and using strong hashing for passwords – As of PHP 5.5, www.php.net/password will make this trivial  Forgotten password resets done by email link  Use OAuth or OpenID  Two factor authentication – High risk data – Premium support verification – Off-site staff authentication method
  • 4. Copyright © 2012 Clickatell. All rights reserved. What the blogs haven't warned us about  No coder is an island  We all rely on: – 3rd party libraries – Frameworks • Symfony • Zend – CMS packages • Joomla! • Wordpress – E-Commerce software • osCommerce • Magento – CRM software • SugarCRM
  • 5. Copyright © 2012 Clickatell. All rights reserved. So... time to come clean... I've done it too  Perception – Using a version of Smarty without vulnerabilities (3.1.12)  Reality – 4 versions of Smarty. – Version 2.6.26 with 11 Vulnerabilities (7 critical) – Version 2.6.28 with 12 Vulnerabilities (7 critical) – Version 2.6.11 with 12 Vulnerabilities (7 critical)  The other three were dependencies of another front end system  Developers had not updated Smarty since 2009 (the version they are using was released in Dec 2005)
  • 6. Copyright © 2012 Clickatell. All rights reserved. Lets get some real world data  43 popular open source web applications, libraries and frameworks.  3,421 versions  5.6 million files
  • 8. Copyright © 2012 Clickatell. All rights reserved. Some graph explanation Mean / Average Median The Doom Line
  • 9. Insert the title of your long presentation names here Enter your subtitle here Some actual numbers please
  • 10. What are SMBs using?
  • 11. Copyright © 2012 Clickatell. All rights reserved. Where does the blame lie?  Wordpress and Joomla! – Highly popular = Highly targeted. – Fix released before the vulnerability disclosed  Libraries not so well behaved – Most of the libraries found where vulnerable – OpenX had a backdoor in their code base  Frameworks came off well – No vulnerabilities for the versions found Reference: http://blog.sucuri.net/2013/08/openx-org-compromised-and-downloads-injected-with-a-backdoor.htm
  • 12. Insert the title of your long presentation names here Enter your subtitle here Lets get a little ageist here
  • 13. Insert the title of your long presentation names here Enter your subtitle here What's the sell by date
  • 14. Insert the title of your long presentation names here Enter your subtitle here Lets just put those together
  • 15. Copyright © 2012 Clickatell. All rights reserved. Some good news at least  We were looking at the worst of the worst – SMB with little technical knowledge – Freelancer CMS deploy  People will fix what they know is broken – Growing awareness – Emergence of auto update tools – Software houses and freelances, up-sell those maintenance contracts
  • 16. Insert the title of your long presentation names here Enter your subtitle here How much has the situation improved
  • 17. Copyright © 2012 Clickatell. All rights reserved. And for the developers  Means of distributing 3rd party code is improving – Composer • Don't commit dependencies... specify • Major release locking • Simple update mechanism