Home >Backend Development >PHP Tutorial >Execute system external commands in PHP_PHP tutorial
As a server-side scripting language, PHP is fully capable of tasks such as writing simple or complex dynamic web pages. But this is not always the case. Sometimes in order to implement a certain function, you must resort to external programs (or commands) of the operating system, so that you can get twice the result with half the effort. So, is it possible to call external commands in a PHP script? If so, how to do it? What are your concerns? I believe that after reading this article, you will definitely be able to answer these questions. Is it possible? The answer is yes. PHP, like other programming languages, can call external commands within the program, and it is very simple: just use one or a few functions. Prerequisites Since PHP is basically used for WEB program development, security has become an important aspect that people consider. So PHP designers added a door to PHP: safe mode. If running in safe mode, the PHP script will be subject to the following four restrictions: There are some restrictions when opening files when executing external commands. Connecting to the MySQL database. HTTP-based authentication. In safe mode, only external programs in specific directories can can be executed, calls to other programs will be denied. This directory can be specified using the safe_mode_exec_dir directive in the php.ini file, or by adding the --with-exec-dir option when compiling PHP. The default is /usr/local/php/bin. If you call an external command that should be able to output results (meaning there are no errors in the PHP script), but you get a blank, then it is likely that your network administrator has run PHP in safe mode. How to do it? To call external commands in PHP, you can use the following three methods: 1) Use the special functions provided by PHP. PHP provides a total of 3 special functions for executing external commands: system(), exec(), and passthru(). system() prototype: string system (string command [, int return_var]) The system() function is similar to that in other languages. It executes the given command, outputs and returns the result. The second parameter is optional and is used to get the status code after the command is executed. Example: system("/usr/local/bin/webalizer/webalizer"); ?> exec() Prototype: string exec (string command [, string array [, int return_var]]) The exec() function is similar to system() , also executes the given command, but does not output the result, but returns the last line of the result. Although it only returns the last line of the command result, using the second parameter array can get the complete result by appending the results line by line to the end of the array. So if the array is not empty, it is best to use unset() to clear it before calling it. Only when the second parameter is specified, the third parameter can be used to obtain the status code of command execution. Example: exec("/bin/ls -l"); exec("/bin/ls -l", $res); exec("/bin/ls -l", $res, $rc); ?> passthru () Prototype: void passthru (string command [, int return_var]) passthru() only calls the command and does not return any results, but outputs the running results of the command directly to the standard output device as is. Therefore, the passthru() function is often used to call programs like pbmplus (a tool for processing images under Unix that outputs a binary stream of original images). It can also get the status code of command execution. Example: header("Content-type: image/gif"); passthru("./ppmtogif hunte.ppm"); ?> 2) Use the popen() function to open the process. The above method can only simply execute the command, but cannot Interact with commands. But sometimes you must enter something into the command. For example, when adding a Linux system user, you need to call su to change the current user to root, and the su command must enter the root password on the command line. In this case, it is obviously not possible to use the method mentioned above. The popen() function opens a process pipe to execute the given command and returns a file handle. Since a file handle is returned, you can read and write to it. In PHP3, this kind of handle can only be used in a single operation mode, either writing or reading; starting from PHP4, it can read and write at the same time. Unless the handle is opened in one mode (read or write), the pclose() function must be called to close it. Example 1: $fp=popen("/bin/ls -l", "r"); ?> Example 2 (This example comes from the PHP China Alliance website http://www.phpx.com/show.php?d= col&i=51): /* How to add a system user in PHP. The following is a routine to add a user named james. The root password is verygood. For reference only*/ $sucommand = "su --login root --command"; $useradd = "useradd "; $rootpasswd = "verygood"; $user = "james"; $user_add = sprintf("%s "% s %s"",$sucommand,$useradd,$user); $fp = @popen($user_add,"w"); @fputs($fp,$rootpasswd); @pclose($fp); ?> 3 ) Use a backtick (`, which is the one under the ESC key on the keyboard, the same as ~). This method has not been included in the PHP documentation before, and it exists as a secret technique. The method is very simple. Use two backticks to enclose the command to be executed as an expression. The value of this expression is the result of the command execution.For example: $res=/bin/ls -l; echo .$res. ; ?> The output of this script is like: hunte.gif hunte.ppm jpg.htm jpg.jpg passthru.php What should be considered? There are two issues to consider: security and timeouts. Let’s look at safety first. For example, you have a small online store, so the list of products available for sale is placed in a file. You write an HTML file with a form that asks your users to enter their email address and then sends them a list of products. Assuming that you have not used PHP's mail() function (or have never heard of it), you call the mail program of the Linux/Unix system to send this file. The program is like this: system("mail $to Using this code will not cause any danger to ordinary users, but in fact there is a very large security hole. If a malicious user enters such an EMAIL Address: --bla ; mail someone@domain.com ) and read from file ( /tmp/null &"); ?>