Research company Imperva is calling for the removal of a feature in PHP, citing that it opens the door for attackers to turn servers across the globe into their own botnet army.
In a report (PDF), the company takes particular issue with the use of PHP's "SuperGlobal" parameters and how they can be abused.
The vulnerability described in the report is not particularly new, and requires chaining together vulnerabilities CVE-2011-2505 and CVE-2010-3065 in order to execute arbitrary code on a server, with CVE-2011-2505 first disclosed in July 2011 and CVE-2010-3065 in August 2010.
Combined, they allow attackers to modify the SESSION SuperGlobal variable, and write data to a local file on the server. This file will be later parsed and executed by PhpMyAdmin, a popular web-based tool used to manage MySQL databases, allowing the attacker to execute any code they wish.
However, the company considers the use of SuperGlobal parameters, which enable both vulnerabilities, to be overpowered, and is advocating for their removal.
"SuperGlobal parameters in requests should be blocked — since there is no reason for these parameters to be present in requests, they should be banned," the report says.