search
HomeBackend DevelopmentPHP Tutorialphp xfocus anti-injection information_PHP tutorial
php xfocus anti-injection information_PHP tutorialJul 21, 2016 pm 03:52 PM
phpItechnologyCompareinjectionofSimplematerial

There is no deep technical content here, I just talked about it briefly. (If there are no specific instructions, the following operations are all based on the situation of PHP+MySQL+Apache) When various hackers are rampant now, how to realize the security of your own PHP code and ensure the security of the program and server is a very important issue. I I casually looked at the information about PHP security, and there is not a lot, at least much less than ASP, haha, so I wanted to write something to prevent these possible situations. There is no deep technical content here, I just talked about it briefly. (If there are no specific instructions, the following operations are all based on PHP+MySQL+Apache)
Let’s talk about security issues first. Let’s first take a look at two articles:
http://www.xfocus.net /articles/200107/227.html
http://www.xfocus.net/articles/200107/228.html

The above article is an article about PHP security on Security Focus. Basically, it is relatively Comprehensive introduction to some security issues about PHP.

When coding in PHP, if you consider some basic security issues, first of all:
1. Initialize your variables

Why do you say that? Let's look at the following code:
if ($admin)
{
echo 'Login successful! ';
include('admin.php');
}
else
{
echo 'You are not an administrator and cannot manage! ';
}

Okay, we see that the above code seems to be running normally and there is no problem. Then let me submit an illegal parameter to it. What will be the effect? For example, our page is http://www.traget.com/login.php, then we submit: http://www.target.com/login.php?admin=1, haha, think about it, we are Either you are an administrator directly, you manage it directly.
Of course, maybe we won’t make such a simple mistake, and some very secret mistakes may also cause this problem. For example, the recently exposed phpwind 1.3.6 forum has a vulnerability that allows us to directly obtain administrator rights. , it is because there is a $skin variable that is not initialized, which leads to a series of problems later.

So how do we avoid the above problems? First, start with php.ini and set register_global = off in php.ini. This means that not all registered variables are global, so this can be avoided. However, we are not server administrators and can only improve the code. So how do we improve the above code? We rewrite it as follows:
$admin = 0; // Initialize variables
if ($_POST['admin_user'] && $_POST['admin_pass'])
{
// Determine the submission The corresponding processing code is whether the administrator username and password are correct
// ...
$admin = 1;
}
else
{
$admin = 0;
}

if ($admin)
{
echo 'Login successful! ';
include('admin.php');
}
else
{
echo 'You are not an administrator and cannot manage! ';
}

Then it won’t work if you submit http://www.target.com/login.php?admin=1 at this time, because we initialize the variables at the beginning If $admin = 0, then you will not be able to obtain administrator privileges through this vulnerability.


2. Prevent SQL Injection (sql injection)

SQL injection should be the most harmful program at present, including the earliest from asp to php, basically in the past two years in China The basic principle of popular technology is to form an injection point by not filtering submitted variables and then enable malicious users to submit some SQL query statements, resulting in important data being stolen, data lost or damaged, or being invaded into the backend management.
I won’t go into the basic principles. Let’s look at the following two articles to understand:
http://www.4ngel.net/article/36.htm
http://www. 4ngel.net/article/30.htm

So now that we understand the basic injection intrusion methods, how can we prevent it? We should start with the code.

We know that there are two ways to submit data on the Web, one is get and the other is post, so many common sql injections start from the get method, and the injection statement must contain some sql Statement, because there is no sql statement, how to proceed? There are four major sentences in sql statement:
select, update, delete, insert. So if we filter the data we submit, can we avoid these problems?
So we use regular expressions to construct the following function:

/*
Function name: inject_check()
Function function: Detect whether the submitted value contains SQL injection characters to prevent injection. Protect server security
Parameters: $sql_str: Submitted variable
Return value: Return the detection result, true or false
Function author: heiyeluren
*/
function inject_check($sql_str)
{
return eregi('select|insert|update|delete|'|/*|*|../|./|union|into|load_file|outfile', $sql_str); // Filter
}

Our function filters out all dangerous parameter strings such as select, insert, update, delete, union, into, load_file, outfile /*, ./, ../, ' etc. , then you can control the submitted parameters. The program can be constructed like this:

if (inject_check($_GET['id']))
{
exit('The data you submitted is illegal, Please check and resubmit! ');
}
else
{
$id = $_GET['id'];
echo 'The submitted data is legal, please continue! ';
}
?>
Suppose we submit the URL as: http://www.target.com/a.php?id=1, then it will prompt:
"Submitted The data is legal, please continue! "
If we submit http://www.target.com/a.php?id=1' select * from tb_name
a prompt will appear: "The data you submitted is illegal. Please check and resubmit! "

Then you have met our requirements.

However, the problem has not been solved yet. If we submit http://www.target.com/a.php?id=1asdfasdfasdf, ours is in compliance with the above rules, but, it It does not meet the requirements, so we build a function to check for possible other situations:

/*
Function name: verify_id()
Function function: Verify the submitted Is the ID class value legal?
Parameters: $id: Submitted ID value
Return value: Returns the processed ID
Function author: heiyeluren
*/
function verify_id($id =null)
{
if (!$id) { exit('No parameters submitted!'); } // Determine whether it is empty
elseif (inject_check($id)) { exit('Submit The parameter is illegal! '); } // Injection judgment
elseif (!is_numeric($id)) { exit('The submitted parameter is illegal!'); } // Numeric judgment
$id = intval($ id); // Integer

return $id;
}

Haha, then we can perform verification, so our program code above becomes the following of:

if (inject_check($_GET['id']))
{
exit('The data you submitted is illegal, please check and resubmit!');
}
else
{
$id = verify_id($_GET['id']); // Our filter function is quoted here to filter $id
echo 'The submitted data is legal, Please continue! ';
}
?>

Okay, the problem seems to be solved here, but have we considered the data submitted by post and the large batch of data?
For example, some characters may cause harm to the database, such as ' _ ', ' % '. These characters have special meanings, so what if we control them? Another point is that when magic_quotes_gpc = off in our php.ini, the submitted data that does not comply with the database rules will not automatically add ' ' in front. Then we need to control these problems, so we build the following Function:

/*
Function name: str_check()
Function function: Filter the submitted string
Parameters: $var: The string to be processed
Return Return value: Return the filtered string
Function author: heiyeluren
*/
function str_check( $str )
{
if (!get_magic_quotes_gpc()) // Determine whether magic_quotes_gpc is turned on
{
$str = addslashes($str); // Filter
}
$str = str_replace("_", "_", $str); // Put '_' Filter out
$str = str_replace("%", "%", $str); // Filter out '%'

return $str;
}

OK, we once again avoided the danger of the server being compromised.

Finally, consider submitting some large batches of data, such as posting, or writing articles or news. We need some functions to help us filter and convert. Based on the above functions, we construct the following Function:

/*
Function name: post_check()
Function function: Process the submitted editing content
Parameters: $post: Content to be submitted
Return Value: $post: Return filtered content
Function author: heiyeluren
*/
function post_check($post)
{
if (!get_magic_quotes_gpc()) // Determine whether magic_quotes_gpc To open
{
$post = addslashes($post); // Filter the submitted data when magic_quotes_gpc is not opened
}
$post = str_replace("_", "_" , $post); // Filter out '_'
$post = str_replace("%", "%", $post); // Filter out '%'
$post = nl2br($ post); // Enter conversion
$post= htmlspecialchars($post); // HTML tag conversion

return $post;
}

Haha, that’s basically it , we have talked about some situations. In fact, I feel that I have talked about very little. At least I have only talked about two aspects, and there is very little content in the entire security. I will consider talking about more next time, including PHP. Security configuration, apache security, etc., let our security be as a whole and be the safest.

Finally, let me tell you what I expressed above: 1. Initialize your variables 2. Remember to filter your variables

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/319026.htmlTechArticleThere is no deep technical content here, I just talked about it briefly. (If there is no specific explanation, the following operations are all based on PHP+MySQL+Apache) When various hackers are rampant now,...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
php怎么把负数转为正整数php怎么把负数转为正整数Apr 19, 2022 pm 08:59 PM

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

php怎么实现几秒后执行一个函数php怎么实现几秒后执行一个函数Apr 24, 2022 pm 01:12 PM

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php字符串有没有下标php字符串有没有下标Apr 24, 2022 am 11:49 AM

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

php怎么除以100保留两位小数php怎么除以100保留两位小数Apr 22, 2022 pm 06:23 PM

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php怎么读取字符串后几个字符php怎么读取字符串后几个字符Apr 22, 2022 pm 08:31 PM

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

php怎么根据年月日判断是一年的第几天php怎么根据年月日判断是一年的第几天Apr 22, 2022 pm 05:02 PM

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

php怎么替换nbsp空格符php怎么替换nbsp空格符Apr 24, 2022 pm 02:55 PM

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\&nbsp\;||\xc2\xa0)/","其他字符",$str)”语句。

php怎么查找字符串是第几位php怎么查找字符串是第几位Apr 22, 2022 pm 06:48 PM

查找方法:1、用strpos(),语法“strpos("字符串值","查找子串")+1”;2、用stripos(),语法“strpos("字符串值","查找子串")+1”。因为字符串是从0开始计数的,因此两个函数获取的位置需要进行加1处理。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft