TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Pear.php.net shuts down after maintainers discover serious supply-chain attack

144 pointsby afshinmehover 6 years ago

10 comments

duckerudeover 6 years ago
&gt; The officials didn’t say when the hack of their Web server occurred or precisely what the malicious version of go-pear.phar did to infected systems.<p>From Twitter (<a href="https:&#x2F;&#x2F;twitter.com&#x2F;pear" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;pear</a>):<p>&gt; What we know: the tainted go-pear.phar file was reported to us on 1&#x2F;18 by the Paranoids FIRE Team. The last release of this file was done 12&#x2F;20, so the taint occurred after that. The taint was verified by us on 1&#x2F;19.<p>&gt; What we know: The taint was an embedded line designed to spawn a reverse shell via Perl to IP 104.131.154.154. This IP has been reported to its host in relation to the taint.<p>&gt; What we know: no other breach was identified. The install-pear-nozlib.phar was ok. The go-pear.phar file at GitHub was ok, and could be used as a good md5sum comparison for any suspect copies.<p>&gt; If you downloaded go-pear.phar before 12&#x2F;20, we have no concrete evidence you received a tainted file... but it would be prudent to check your system if you used go-pear.phar to perform a PEAR installation in the last several months.
mysterydipover 6 years ago
A good reminder to run your webserver with only the privileges it needs, including read&#x2F;write permissions on the filesystem outside www and shell execution of commands on the system.<p>Also not a bad idea to have some kind of file compare against a &quot;known good&quot; folder of your site(s) to determine if any files have been modified or added, such as webshells.
评论 #18988875 未加载
评论 #18988600 未加载
megousover 6 years ago
It just shows how many people verify PGP signatures, if this was discovered after a month.
评论 #18989565 未加载
erickjover 6 years ago
Aptly timed vulnerability with this article <a href="https:&#x2F;&#x2F;research.swtch.com&#x2F;deps" rel="nofollow">https:&#x2F;&#x2F;research.swtch.com&#x2F;deps</a>
评论 #18987907 未加载
评论 #18988074 未加载
评论 #18988033 未加载
rawfanover 6 years ago
Thankfully nobody is using PEAR anymore. Using composer doesn&#x27;t solve the problem of blinedly pulling internet dependencies, though (as others pointed out).<p>What I currently do is grepping vendor for common smells like usage of eval() or obfuscations of the same thing after doing a composer update on a project.
评论 #18988717 未加载
评论 #18988602 未加载
评论 #18988335 未加载
ddtaylorover 6 years ago
Does anyone know if composer ever uses PEAR?
评论 #18988010 未加载
hjekover 6 years ago
Are GNU&#x2F;Linux distros affected?
评论 #18988201 未加载
aboutrubyover 6 years ago
I&#x27;m not doing PHP anymore, but never heard of PEAR, everybody seems to use Composer since quite a while. Seems like the transition happened in 2014-2015.
Hagaover 6 years ago
If a company does not invest in open source and uses it - it has to invest into open source to kee using it. Well at least it&#x27;s under the security budget and doesn&#x27;t look like a voluntarily paid tax anymore.
ccnafrover 6 years ago
This article is outdated. Check the PEAR Twitter profile for new information.<p>It would be nice if journalists would keep up with the things they report on.
评论 #18988536 未加载
评论 #18990012 未加载