Skip to content

Commit 5ad2d51

Browse files
authored
Add security audit post (#209)
* Add security audit post * Add report file * Fix links
1 parent a6726c4 commit 5ad2d51

File tree

2 files changed

+77
-0
lines changed

2 files changed

+77
-0
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: 'PHP Core Security Audit Results'
3+
layout: post
4+
tags:
5+
- news
6+
author:
7+
- name: Roman Pronskiy
8+
url: https://twitter.com/pronskiy
9+
published_at: 10 April 2025
10+
---
11+
12+
The PHP Foundation is pleased to announce the completion of a comprehensive security audit of the PHP source code ([php/php-src](https://github.com/php/php-src)), **commissioned by the [Sovereign Tech Agency](https://www.sovereign.tech/)**.
13+
14+
This initiative was organized in partnership with the [Open Source Technology Improvement Fund](https://ostif.org/) (OSTIF) and executed by the esteemed security group [Quarkslab](https://www.quarkslab.com/).
15+
16+
## Audit Overview
17+
18+
Conducted over a two-month period in 2024, the audit encompassed:
19+
20+
* Development of a threat model tailored to php-src
21+
* Manual code reviews
22+
* Dynamic testing procedures
23+
* Cryptographic assessments
24+
25+
The collaboration between Quarkslab’s auditors and PHP maintainers ensured a thorough examination of the codebase.
26+
27+
> _⚠️_
28+
Due to budget constraints, the recent security audit focused on the most critical components of the PHP source code rather than the entire codebase. Organizations interested in sponsoring a comprehensive audit or additional assessments are encouraged to [contact us](mailto:[email protected])!
29+
> _⚠️_
30+
31+
## Key Findings
32+
33+
The audit identified 27 issues, with 17 having security implications:
34+
35+
* 3 High-severity
36+
* 5 Medium-severity
37+
* 9 Low-severity
38+
39+
Additionally, 10 informational findings were reported.
40+
41+
Notably, four vulnerabilities received CVE identifiers:
42+
43+
* CVE-2024-9026: Log tampering vulnerability in PHP-FPM, allowing potential manipulation or removal of characters from log messages.
44+
* CVE-2024-8925: Flaw in PHP’s multipart form data parsing, potentially leading to data misinterpretation.
45+
* CVE-2024-8928: Memory-related vulnerability in PHP’s filter handling, leading to segmentation faults.
46+
* CVE-2024-8929: Issue where a malicious MySQL server could cause the client to disclose heap content from other SQL requests.
47+
48+
## Recommendations and Resolutions
49+
50+
Quarkslab’s report commended the overall high quality and specification adherence of the php/php-src project.
51+
52+
The PHP development team has addressed all identified issues. Users are strongly encouraged to upgrade to the latest PHP versions to benefit from these security enhancements.
53+
54+
## Acknowledgments
55+
56+
We extend our gratitude to the individuals and organizations that made this audit possible:
57+
58+
* **The PHP Foundation Team and PHP maintainers:**
59+
Jakub Zelenka, Arnaud Le Blanc, Niels Dossche, Ilija Tovilo, Stas Malyshev, Dmitry Stogov, Derick Rethans, and Roman Pronskiy.
60+
* **Quarkslab Team:**
61+
Angèle Bossuat, Julio Loayza Meneses, Mihail Kirov, Sebastien Rolland, Ramtine Tofighi Shirazi.
62+
* **Sovereign Tech Agency:**
63+
Abigail Garner and the team – for commissioning the audit and all the help.
64+
* **OSTIF:**
65+
Amir Montazery, Derek Zimmer, Helen Woeste – for organizing the collaboration.
66+
67+
This audit underscores our commitment to enhancing PHP’s security and reliability. We remain dedicated to ongoing improvements and collaborations to ensure PHP’s robustness for the global development community.
68+
69+
## Further Reading
70+
71+
* [Audit Report](/assets/files/24-07-1730-REP-V1.4_temp.pdf)
72+
* [OSTIF Blog](https://ostif.org/php-audit-complete/)
73+
* [Quarkslab Blog](https://blog.quarkslab.com/)
74+
75+
If your company is interested in commissioning another round of security audit, please contact The PHP Foundation team: [[email protected]](mailto:[email protected]).
76+
77+
🐘💜
Binary file not shown.

0 commit comments

Comments
 (0)