|
| 1 | +--- |
| 2 | +title: 'PHP Core Security Audit Results' |
| 3 | +layout: post |
| 4 | +tags: |
| 5 | + - news |
| 6 | +author: |
| 7 | + - name: Roman Pronskiy |
| 8 | + url: https://twitter.com/pronskiy |
| 9 | +published_at: 10 April 2025 |
| 10 | +--- |
| 11 | + |
| 12 | +The PHP Foundation is pleased to announce the completion of a comprehensive security audit of the PHP source code ([php/php-src](https://github.com/php/php-src)), **commissioned by the [Sovereign Tech Agency](https://www.sovereign.tech/)**. |
| 13 | + |
| 14 | +This initiative was organized in partnership with the [Open Source Technology Improvement Fund](https://ostif.org/) (OSTIF) and executed by the esteemed security group [Quarkslab](https://www.quarkslab.com/). |
| 15 | + |
| 16 | +## Audit Overview |
| 17 | + |
| 18 | +Conducted over a two-month period in 2024, the audit encompassed: |
| 19 | + |
| 20 | +* Development of a threat model tailored to php-src |
| 21 | +* Manual code reviews |
| 22 | +* Dynamic testing procedures |
| 23 | +* Cryptographic assessments |
| 24 | + |
| 25 | +The collaboration between Quarkslab’s auditors and PHP maintainers ensured a thorough examination of the codebase. |
| 26 | + |
| 27 | +> _⚠️_ |
| 28 | +Due to budget constraints, the recent security audit focused on the most critical components of the PHP source code rather than the entire codebase. Organizations interested in sponsoring a comprehensive audit or additional assessments are encouraged to [contact us ](mailto:[email protected])! |
| 29 | +> _⚠️_ |
| 30 | +
|
| 31 | +## Key Findings |
| 32 | + |
| 33 | +The audit identified 27 issues, with 17 having security implications: |
| 34 | + |
| 35 | +* 3 High-severity |
| 36 | +* 5 Medium-severity |
| 37 | +* 9 Low-severity |
| 38 | + |
| 39 | +Additionally, 10 informational findings were reported. |
| 40 | + |
| 41 | +Notably, four vulnerabilities received CVE identifiers: |
| 42 | + |
| 43 | +* CVE-2024-9026: Log tampering vulnerability in PHP-FPM, allowing potential manipulation or removal of characters from log messages. |
| 44 | +* CVE-2024-8925: Flaw in PHP’s multipart form data parsing, potentially leading to data misinterpretation. |
| 45 | +* CVE-2024-8928: Memory-related vulnerability in PHP’s filter handling, leading to segmentation faults. |
| 46 | +* CVE-2024-8929: Issue where a malicious MySQL server could cause the client to disclose heap content from other SQL requests. |
| 47 | + |
| 48 | +## Recommendations and Resolutions |
| 49 | + |
| 50 | +Quarkslab’s report commended the overall high quality and specification adherence of the php/php-src project. |
| 51 | + |
| 52 | +The PHP development team has addressed all identified issues. Users are strongly encouraged to upgrade to the latest PHP versions to benefit from these security enhancements. |
| 53 | + |
| 54 | +## Acknowledgments |
| 55 | + |
| 56 | +We extend our gratitude to the individuals and organizations that made this audit possible: |
| 57 | + |
| 58 | +* **The PHP Foundation Team and PHP maintainers:** |
| 59 | + Jakub Zelenka, Arnaud Le Blanc, Niels Dossche, Ilija Tovilo, Stas Malyshev, Dmitry Stogov, Derick Rethans, and Roman Pronskiy. |
| 60 | +* **Quarkslab Team:** |
| 61 | + Angèle Bossuat, Julio Loayza Meneses, Mihail Kirov, Sebastien Rolland, Ramtine Tofighi Shirazi. |
| 62 | +* **Sovereign Tech Agency:** |
| 63 | + Abigail Garner and the team – for commissioning the audit and all the help. |
| 64 | +* **OSTIF:** |
| 65 | + Amir Montazery, Derek Zimmer, Helen Woeste – for organizing the collaboration. |
| 66 | + |
| 67 | +This audit underscores our commitment to enhancing PHP’s security and reliability. We remain dedicated to ongoing improvements and collaborations to ensure PHP’s robustness for the global development community. |
| 68 | + |
| 69 | +## Further Reading |
| 70 | + |
| 71 | +* [Audit Report](/assets/files/24-07-1730-REP-V1.4_temp.pdf) |
| 72 | +* [OSTIF Blog](https://ostif.org/php-audit-complete/) |
| 73 | +* [Quarkslab Blog](https://blog.quarkslab.com/) |
| 74 | + |
| 75 | +If your company is interested in commissioning another round of security audit, please contact The PHP Foundation team: [[email protected]](mailto:[email protected]). |
| 76 | + |
| 77 | +🐘💜 |
0 commit comments