Details remain foggy about a recent security breach at the PHP PEAR website, a crucial, but lesser-known part of the PHP ecosystem.
More security news
PEAR, which stands for “PHP Extension and Application Repository,” is the first package manager that was developed for the PHP scripting language back in the 1990s, and works by allowing developers to load and reuse code for common functions delivered as PHP libraries.
While currently most PHP developers have switched to using Composer, a newer third-party package manager, PEAR still remains very popular and is still very widespread because it’s also been included by default with all official PHP binaries for Linux.
PHP developers can use the PEAR version that ships with their PHP distribution, but they can also download an updated PEAR (go-pear.phar) version from the PEAR website (which also hosts all PEAR-compatible PHP libraries).
However, last week, the PHP PEAR website –located at pear.php.net— was taken down and its homepage replaced with a short message announcing a security breach.
According to the message, the PEAR team said they’ve found that the official website had been hosting a “tainted go-pear.phar” file –which is the main PHP PEAR executable.
“If you have downloaded this go-pear.phar in the past six months, you should get a new copy of the same release version from GitHub (pear/pearweb_phars) and compare file hashes,” said the message on the official website. “If different, you may have the infected file.”
According to a VirusTotal scan of the tainted go-pear.phar file, the malicious version made available through the official PEAR website appears to contain what some antivirus vendors are describing as a backdoor.
What exactly this backdoor does, is currently unknown, as the PHP PEAR team is still analyzing the file’s source code, which contains thousands of line of code.
All PHP web servers where administrators installed an update to the PHP PEAR executable (go-pear.phar) that they downloaded from the PEAR website should be considered compromised and treated accordingly.
The PHP PEAR team says it’s still auditing and rebuilding its website, looking for the security hole that attackers exploited six months ago to plant the backdoored go-pear.phar file in the first place.
PEAR developers promised a more detailed incident post-mortem when this operation concludes.
In the meantime, earlier today, the PHP PEAR team also released PEAR v1.10.10, a new PEAR release, which is identical with the previous release v1.10.9, but which the PHP PEAR team uploaded on GitHub to give it a new timestamp and signal that it’s a clean version that webmasters can install without fear of downloading a potentially backdoored release.
While PHP currently powers nearly 79 percent of all internet sites, only a small portion of them are likely to be affected by this incident, as most people either use Composer or rarely update the PEAR executable in the first place.
More security coverage:
- SCP implementations impacted by 36-years-old security flaws
- Temporary fix available for one of the two Windows zero-days released in December
- Online stores for governments and multinationals hacked via new security flaw
- Websites can steal browser data via extensions APIs
- Security researchers take down 100,000 malware sites over the last ten months
- Popular WordPress plugin hacked by angry former employee
- Apple to host 2,000 free coding lessons at European stores CNET
- Around 62% of all Internet sites will run an unsupported PHP version in 10 weeks TechRepublic
- 'Mysteries' surrounding Master Chief will be discussed at the Halo 5 panel at Comic-Con
- Valve Launches Mysterious Team Fortress 2 Teaser Website
- Mysterious No Man's Sky Website Goes Live As Part Of Alternate-Reality Game Ahead Of New Update
- Noclip is a neat new website that lets you freely explore datamined maps from classic games
- Reddit hack – what was stolen, is your account safe and what should you do now?
- .hack Developer CyberConnect2 Will Announce its Vision for the Future in February
- Over 400,000 Users Exposed in Furry Porn Game ‘High Tail Hall’ Hack
- TaskRabbit hack – app offline over ‘cybersecurity incident’, users warned to change passwords immediately
- Hacking Arts 2016 News & Update: MIT Crowns ‘Pokémon GO-esque’ Musical Thinking Tool First Place; ‘Harmony Space’ App Uses HoloLens
- Resistance's community website hacked by hackers