{"id":36699,"date":"2021-04-28T17:44:32","date_gmt":"2021-04-28T17:44:32","guid":{"rendered":"https:\/\/www.vmengine.net\/2021\/04\/28\/php-shakes-the-web-git-server-hacked\/"},"modified":"2025-05-23T17:31:29","modified_gmt":"2025-05-23T17:31:29","slug":"php-shakes-the-web-git-server-hacked","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2021\/04\/28\/php-shakes-the-web-git-server-hacked\/","title":{"rendered":"PHP Shakes the Web: Git Server Hacked"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_296 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_394\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_400  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1088  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">Hackers hack the git.php.net Git server and introduce a backdoor into the source code <\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1089  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p style=\"text-align: center;\"><strong>The Attack<\/strong><\/p>\n<p>PHP has also come under fire from web hackers, who were the victim of the attack on a GIT server. According to the information disclosed through the <a href=\"https:\/\/news-web.php.net\/php.doc\/969387866\">official PHP release<\/a> , two malicious commits were sent as Nikita Popov and Rasmus Lerdorf, compromising git.php.net.<br \/>PHP immediately decided to stop the server and push any future changes to GitHub instead of git.php.net.<\/p>\n<p>The two malicious commits were inserted into the source code as &#8220;fix typos&#8221;, i.e. passing them off as simple spelling corrections made by the developers.<\/p>\n<p>In addition, the code also included the <em><br \/>\n  <strong>zend_eval_string<\/strong><br \/>\n<\/em> instruction used by the attacker to install the backdoor that would then allow him to execute remote code execution (RCE) on any website that executed the tampered code.<\/p>\n<p>Probably the recent attack on SolarWinds&#8217; Orion alerted PHP which, from the beginning, intervened to limit the damage of the hacker attack. In fact, the recent attack on U.S. government agencies and the attack on PHP seem to have the same matrix. Even in the case of SolarWinds, the vulnerability of the platform had allowed the source code to be modified, allowing hackers to execute the code directly remotely.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1090  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p style=\"text-align: center;\"><strong>How to ward off this type of attack<\/strong><\/p>\n<p>PHP&#8217;s first request to its users was to use GitHub for edits, or to join the organization if they weren&#8217;t.<\/p>\n<p>The huge advantage of using platforms like GitHub or<a href=\"https:\/\/aws.amazon.com\/it\/codecommit\/\"> CodeCommit<\/a> is that, almost always, the attack surface would boil down to simply stealing credentials from the victim&#8217;s PC. Whereas, in the case of PHP, a vulnerability in Git has been exploited, or a &#8220;too permissive&#8221; configuration of it.<\/p>\n<p><a href=\"https:\/\/aws.amazon.com\/it\/\">Amazon Web Services<\/a> offers the CodeCommit service that takes care of the security of your Git repository. Customers generally use private repositories that are not visible to the public even in read-only mode. CodeCommit integrates with AWS IAM to manage access across users, roles, groups, and access policies. Proper management of these elements allows you to keep access to the repository safe (always after theft of credentials and passwords). In addition, CodeCommit<a href=\"https:\/\/stackoverflow.com\/questions\/48266577\/aws-codecommit-public-repository\"> does not allow the use of public repositories<\/a> such as GitHub or GitLab, or its own Git server.<br \/>So in the case of PHP it wouldn&#8217;t have been usable because it&#8217;s free software that needs to be visible to the community.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_165 et_animated et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark\">\n<div class=\"et_pb_promo_description\">\n<div>The Fantacalcio.it platform is also among the customers that successfully uses services such as AWS CodeCommit.<\/div>\n<\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/en\/project\/fantagazzetta\/\" target=\"_blank\">See the Fantacalcio.it case study  <\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers hack the git.php.net Git server and introduce a backdoor into the source code The Attack PHP has also come under fire from web hackers, who were the victim of the attack on a GIT server. According to the information disclosed through the official PHP release , two malicious commits were sent as Nikita Popov [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":33095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,1374],"tags":[3304,4603,4604,4154,2979],"class_list":["post-36699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-the-analysis","tag-amazon-web-service-en","tag-git-en","tag-git-server-hacked","tag-hacker-attack","tag-php-en"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/04\/cybercrime-cyber-security-KL4J2UG-min-scaled.jpg","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=36699"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36699\/revisions"}],"predecessor-version":[{"id":41591,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36699\/revisions\/41591"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/33095"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=36699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=36699"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=36699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}