


Summary of security issues that need to be paid attention to when using PHP weak types
Weakly typed language is also called weakly typed language. The opposite of strongly typed definition. Languages such as VB and PHP are weakly typed. This article will give you a detailed introduction to the security issues of PHP's weak types. You can refer to them if necessary. Let's take a look together.
Preface
I believe everyone knows that PHP is the best language in the world, and the problems of PHP itself can also be regarded as web security. One aspect. The characteristics in PHP are weak types and built-in functions loose handling of incoming parameters.
This article is mainly to record the problems in PHP functions that I encountered on the offensive and defensive platform, as well as the problems caused by PHP's weak types. It has certain reference value for everyone when learning or using PHP. Let’s take a look together.
Introduction to PHP weak types
The reason why the editor thinks that PHP is very powerful is because PHP provides many unique features for developers to use , one of which is the PHP weak type mechanism.
In PHP, you can perform the following operations.
$param = 1; $param = array(); $param = "stringg";
Weakly typed languages have no restrictions on the data type of variables. You can assign variables to any other types of variables at any time, and the variables can also be converted to any Other types of data.
Type conversionProblem
Type conversion is an unavoidable problem. For example, when you need to convert GET or POST parameters into int type, or when the two variables do not match, PHP will automatically convert the variables. However, PHP is a weakly typed language, which leads to many unexpected problems when performing type conversion.
Comparison operators
Type conversion
at$a==$ There are many examples of
$a=null;$b=flase ; //true $a='';$b=null; //truein the comparison of b
, and these comparisons are all equal.
There are also type conversion problems when using comparison operators, as follows:
0=='0' //true 0 == 'abcdefg' //true 0 === 'abcdefg' //false 1 == '1abcdef' //true
When variables of different types are compared, there will be variable conversion problems. During conversion There may be problems later.
Hash comparison
In addition to the above method, there are also problems when performing hash comparison. As follows:
"0e132456789"=="0e7124511451155" //true "0e123456abc"=="0e1dddada" //false "0e1abc"=="0" //true
When performing comparison operations, if a string like 0e\d+
is encountered, this string will be parsed into scientific notation. Therefore, the values of the two numbers in the above example are both 0 and they are equal. If 0e\d+
is not satisfied, this pattern will not be equal. This question is tested in the md5 collision in the offensive and defensive platform.
HexadecimalConversion
There is also a problem when comparing hexadecimal remainder strings.
Examples are as follows:
"0x1e240"=="123456" //true "0x1e240"==123456 //true "0x1e240"=="1e240" //false
When one of the strings starts with 0x, PHP will parse the string into decimal and then compare it. When 0x1240 is parsed into decimal, it is 123456, so Comparisons with 123456 of int type and string type are all equal. The difficulty in naming in the offensive and defensive platform is due to this characteristic of inspection.
Type conversion
Common conversions are mainly converting int to string and string to int.
int to string:
$var = 5; 方式1:$item = (string)$var; 方式2:$item = strval($var);
string to int: intval()
function.
For this function, you can look at 2 examples first.
var_dump(intval('2')) //2 var_dump(intval('3abcd')) //3 var_dump(intval('abcd')) //0
Explanationintval()
When converting, the conversion will be performed from the beginning of the string until a non-numeric character is encountered. Even if a string that cannot be converted appears, intval()
will not report an error but return 0.
intval()
This feature is tested in the question of MYSQL in the offensive and defensive platform.
At the same time, programmers should not use the following code when programming:
if(intval($a)>1000) { mysql_query("select * from news where id=".$a) }
At this time, the value of $a may be 1002 union…..
Built-inParameters of functionsThe looseness of
The looseness of built-in functions means that when calling a function, it is passed to the function Function cannot accept parameter type. The explanation is a bit confusing, so let’s illustrate the problem directly through practical examples. Below we will focus on a few such functions.
md5()
$array1[] = array( "foo" => "bar", "bar" => "foo", ); $array2 = array("foo", "bar", "hello", "world"); var_dump(md5($array1)==var_dump($array2)); //true
The description of the md5() function in the PHP manual is string md5 ( string $str [, bool $raw_output = false ] )
, md5()
needs to be a string type parameter. But when you pass an array, md5()
will not report an error, and knowledge will not be able to correctly calculate the md5 value of the array, which will cause the md5 values of any two arrays to be equal. This md5()
feature is also considered in bypass again in the attack and defense platform.
strcmp()
strcmp()
函数在PHP官方手册中的描述是int strcmp ( string $str1 , string $str2 )
,需要给strcmp()
传递2个string类型的参数。如果str1小于str2,返回-1,相等返回0,否则返回1。strcmp函数比较字符串的本质是将两个变量转换为ascii,然后进行减法运算,然后根据运算结果来决定返回值。
如果传入给出strcmp()
的参数是数字呢?
$array=[1,2,3]; var_dump(strcmp($array,'123')); //null,在某种意义上null也就是相当于false。
strcmp这种特性在攻防平台中的pass check有考到。
switch()
如果switch是数字类型的case的判断时,switch会将其中的参数转换为int类型。如下:
$i ="2abc"; switch ($i) { case 0: case 1: case 2: echo "i is less than 3 but not negative"; break; case 3: echo "i is 3"; }
这个时候程序输出的是i is less than 3 but not negative
,是由于switch()
函数将$i进行了类型转换,转换结果为2。
in_array()
在PHP手册中,in_array()
函数的解释是bool in_array ( mixed $needle , array $haystack [, bool $strict = FALSE ] )
,如果strict参数没有提供,那么in_array就会使用松散比较来判断$needle
是否在$haystack
中。当strince的值为true时,in_array()
会比较needls的类型和haystack中的类型是否相同。
$array=[0,1,2,'3']; var_dump(in_array('abc', $array)); //true var_dump(in_array('1bc', $array)); //true
可以看到上面的情况返回的都是true,因为'abc'会转换为0,'1bc'转换为1。
<a href="http://www.php.cn/wiki/1007.html" target="_blank">array_search</a>()
与in_array()
也是一样的问题。
The above is the detailed content of Summary of security issues that need to be paid attention to when using PHP weak types. For more information, please follow other related articles on the PHP Chinese website!

To protect the application from session-related XSS attacks, the following measures are required: 1. Set the HttpOnly and Secure flags to protect the session cookies. 2. Export codes for all user inputs. 3. Implement content security policy (CSP) to limit script sources. Through these policies, session-related XSS attacks can be effectively protected and user data can be ensured.

Methods to optimize PHP session performance include: 1. Delay session start, 2. Use database to store sessions, 3. Compress session data, 4. Manage session life cycle, and 5. Implement session sharing. These strategies can significantly improve the efficiency of applications in high concurrency environments.

Thesession.gc_maxlifetimesettinginPHPdeterminesthelifespanofsessiondata,setinseconds.1)It'sconfiguredinphp.iniorviaini_set().2)Abalanceisneededtoavoidperformanceissuesandunexpectedlogouts.3)PHP'sgarbagecollectionisprobabilistic,influencedbygc_probabi

In PHP, you can use the session_name() function to configure the session name. The specific steps are as follows: 1. Use the session_name() function to set the session name, such as session_name("my_session"). 2. After setting the session name, call session_start() to start the session. Configuring session names can avoid session data conflicts between multiple applications and enhance security, but pay attention to the uniqueness, security, length and setting timing of session names.

The session ID should be regenerated regularly at login, before sensitive operations, and every 30 minutes. 1. Regenerate the session ID when logging in to prevent session fixed attacks. 2. Regenerate before sensitive operations to improve safety. 3. Regular regeneration reduces long-term utilization risks, but the user experience needs to be weighed.

Setting session cookie parameters in PHP can be achieved through the session_set_cookie_params() function. 1) Use this function to set parameters, such as expiration time, path, domain name, security flag, etc.; 2) Call session_start() to make the parameters take effect; 3) Dynamically adjust parameters according to needs, such as user login status; 4) Pay attention to setting secure and httponly flags to improve security.

The main purpose of using sessions in PHP is to maintain the status of the user between different pages. 1) The session is started through the session_start() function, creating a unique session ID and storing it in the user cookie. 2) Session data is saved on the server, allowing data to be passed between different requests, such as login status and shopping cart content.

How to share a session between subdomains? Implemented by setting session cookies for common domain names. 1. Set the domain of the session cookie to .example.com on the server side. 2. Choose the appropriate session storage method, such as memory, database or distributed cache. 3. Pass the session ID through cookies, and the server retrieves and updates the session data based on the ID.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Notepad++7.3.1
Easy-to-use and free code editor

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.