PHP Users Database got Hacked in Recent Source Code Attack

The developers have moved to the new system with TLS 1.2 support, and also reset all passwords.

PHP developer Nikita Popov posted details of an incident involving a hacking of the official PHP Git repository at the end of last month.

“We no longer believe that the server has been compromised. However, there is a possibility that the user database will be leaked. is used for authentication and various management tasks, ”explained Nikita Popov, the PHP language developer.

Recall that on March 28 of this year, unknown persons added malicious commits to the PHP repository, disguised as PHP developers Rasmus Lerdorf and Nikita Popov. The commits were offered under the guise of typographical fixes, but in fact changed the PHP source code to implement a remotely managed backdoor.

“ supports pushing changes not only over SSH (using the Gitolite framework and public key cryptography), but also over HTTPS. Instead of Gitolite, we used git-http-backend to authenticate Apache 2 Digest to the user database, ”Popov explained.

Investigating the incident revealed that the commits were added to the repository via HTTPS and "password-based authentication".

As Popov noted, the attacker made only a few attempts to guess the logins and successfully logged in after finding the correct one. The developer believes that the user database has been compromised, but it remains unknown why the attacker had to guess the logins in this case.

For security purposes, the developers have moved to the new system with TLS 1.2 support, and also reset all existing passwords. As Popov noted, now all passwords are stored using the bcrypt algorithm.