More details released about the incident, though the attacker remains unidentified

PHP maintainers have released a post-mortem report after a backdoor was planted in the scripting language official Git repository

The maintainers of PHP have released a post-mortem report after an unknown actor pushed backdoored code onto the scripting language’s official PHP Git repository.

As previously reported by The Daily Swig, an attacker pushed two commits to the php-src repo that contained a backdoor allowing for remote code execution (RCE).

They are thought to have gained access to the main server, which allowed them to plant the backdoor under the guise of a minor edit made in a maintainer’s name.

Last night (April 6), maintainer Nikita Popov released more details related to the attack and said the team no longer believes the server was compromised, but that the user database was leaked.

BACKGROUND Backdoor planted in PHP Git repository after server hack

The update includes information on a series of changes made to improve security, including that the has been migrated to a new system,

All passwords have been reset and users need to request a new one via the ‘forgot password’ function.

Popov also revealed that both and are now read-only “but will remain available for the time being”.

Deep dive

After first suspecting that PHP co-creator Rasmus Lerdorf’s account had been compromised, Popov said she investigated the PHP giolite installation to determine which account pushed the malicious code.

It was then that she realized that there were no git-receive-pack entries for the two malicious commits, meaning that they bypassed the gitolite infrastructure entirely.

“This was interpreted as likely evidence of a server compromise,” wrote Popov.

The team then discontinued the server and migrated to GitHub as the repository host.

Read more of the latest database security news

Popov also found that intentionally supported pushing changes not only via SSH
but also via HTTPS.

“The latter did not use gitolite, and instead used git-http-backend behind Apache2 Digest authentication against the user database.”

Popov added: “Based on access logs, we can determine that the commits were indeed pushed using HTTPS and password-based authentication.”

Unclear entry point

The team suspects that a database leak gave the malicious attacker access to the passwords, though they also made several attempts to guess usernames, with Popov writing that “it is unclear why the attacker would need to guess usernames in that case”.

In light of a possible leak, changes have been made including migrating to, which is running PHP 8, and introducing support for TLS1.2.

Popov also noted that the implementation has been moved towards using parameterized queries, “to be more confident that SQL injections cannot occur”.

Passwords are now stored using bcrypt after previously being stored in a format compatible with HTTP Digest authentication – “essentially a plain md5 hash” – which was required for HTTP authentication on and

More details on the changes can be found in Popov’s advisory.

YOU MAY ALSO LIKE UC Berkeley confirms data breach, becomes latest victim of Accellion cyber-attack