Adrian Ciutureanu pressed the little lettered thingies in this order...

> This is a good code. Read http://php.net/realpath
> 

You are correct. I was unaware of the addition of the realpath() function 
to PHP. According to the description of realpath(), using it should close 
this hole also.

> > -----Original Message-----
> > From: Christopher Ostmo [mailto:[EMAIL PROTECTED]]
> > Sent: 5 iulie 2001 19:57
> > To: Adrian Ciutureanu
> > Cc: [EMAIL PROTECTED]
> > Subject: RE: [PHP] Security of PHP code 
> > 
> > 
> > Adrian Ciutureanu pressed the little lettered thingies in 
> > this order...
> > 
> > > $allowed_path = '/www/sites/mysite/teaching';
> > > $file = realpath($file);
> > > if(ereg("^$allowed_path", $file)) {
> > >  // it's OK
> > > } else {
> > >  // possible attack!
> > > }
> > > 
> > 
> > This is not good code.
> > 
> > A user could replace the $file in the URL with this:
> > /www/sites/mysite/teaching/../../../../etc/passwd
> > Since it starts with $allowed_path, your code has just been fooled.
> > 
> > The basic problem that I have seen with posts to this thread 
> > is the fact 
> > that many people do not understand how Unix servers address and/or 
> > secure files. If what I have written above doesn't make any sense, 
> > please go and pick up a book that covers Unix/Linux security. If you
> > don't, you are inviting a security breach.  You may or may not be aware
> > of this, but many hackers know Unix, it's security and it's common
> > vulnerabilities VERY well and they WILL exploit your code if it is
> > exploitable.
> > 
> > Simply checking to see if a particular path exists in the URL will 
> > NEVER secure this issue.
> > 
> > Here's the script that I use:
> > 
> > <?
> > require("common.php");
> > $f = ereg_replace("/","",$f);
> > commonHeader("$f Source Code");
> > ?>
> > <table border="1" cellpadding="3" cellspacing="0" bgcolor="#FFFFFF">
> > <tr><td> <? show_source("./calendar/$f"); ?> </td></tr> </table> <?
> > commonFooter(); ?>
> > 
> > I explicitly declare the path and I delete all forward 
> > slashes. This means 
> > that if someone tries to send:
> > $f=calendar/../../../.../../../../etc/passwd
> > They instead send:
> > $f=calendar...............etcpasswd
> > And the server interprets this as:
> > ./calendar/calendar...............etcpasswd
> > 
> > The bottom line is that no files outside of the intended 
> > directory will ever 
> > be viewable through this script, regardless of how clever, smart or
> > devious the user might be.
> > 
> > I could have gotten a little more fancy and given warnings if 
> > there were 
> > forward slashes, but the point is this: If you are allowing 
> > real file names 
> > to be passed as the parameter, you HAVE to do one of two things:
> > 1) Strip or otherwise block forward slashes and/or 
> > consecutive periods.
> > 2) Declare the file path before the show_source() call and disallow
> > consecutive periods (".."), forward slashes or both.  This is the method
> > used at slashdot.
> > 

Christopher Ostmo
a.k.a. [EMAIL PROTECTED]
AppIdeas.com
Innovative Application Ideas
Meeting cutting edge dynamic
web site needs since the 
dawn of Internet time (1995)

Business Applications:
http://www.AppIdeas.com/

Open Source Applications:
http://open.AppIdeas.com/

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to