The developers of the PHP scripting language have shared an update on the recently disclosed breach in which attackers planted malicious code.
The malicious code, discovered in late March, was found in the php-src repository hosted on the git.php.net server and it was apparently designed to allow an attacker to remotely execute arbitrary PHP code. PHP developers said the backdoor was discovered before it was pushed out to users via an update.
Initially, users were told that evidence pointed to a compromise of the git.php.net server rather than a Git account hijacking.
However, in an update shared this week, Nikita Popov, an important PHP contributor, said they no longer believe the git.php.net server was compromised.
Further investigation revealed that git.php.net had allowed developers to push changes — in addition to SSH via Gitolite infrastructure and public key cryptography — using HTTPS and password-based authentication. The attacker apparently leveraged this HTTPS channel to push the malicious PHP commits.
“I’m not sure why password-based authentication was supported in the first place, as it is much less secure than pubkey authentication,” Popov said.
Logs showed that it took the attacker a relatively small number of attempts to guess a username, and then successfully authenticated.
“While we don’t have any specific evidence for this, a possible explanation is that the user database of master.php.net has been leaked, although it is unclear why the attacker would need to guess usernames in that case,” Popov explained.
He added, “The master.php.net system, which is used for authentication and various management tasks, was running very old code on a very old operating system / PHP version, so some kind of vulnerability would not be terribly surprising.”
In response to the incident, all php.net passwords have been reset, the use of the git.php.net server has been discontinued in favor of GitHub, and steps have been taken to make master.php.net more secure.
Related: Two Malware-Laced Gems Found in RubyGems Repository
Related: Source Code From Major Firms Leaked via Unprotected DevOps Infrastructure
Related: Critical Vulnerability Patched in PHP Package Repository

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
