Skip to main content

PHP Securely transform $_GET / $_POST array



I was checking my script for vulnerabilities and was shocked the way i used to do in the past which is extremely insecure:







foreach ($_GET as $key => $value){

$$key = $value;

}







or shorter







extract( $_GET );







I altered with firebug some POST/GET variables to match a name i used in my script. they can be overwritten if the name would be guessed correctly.





So i thought i had to do it individually naming like this: $allowed_vars =







$allowed_vars = array("time","hotfile","netload","megaupload","user","pfda","xyz","sara","amount_needed");

foreach ($_GET as $key => $value)

{

if (in_array($key,$allowed_vars))

{

$$key = $value;

}

}







This way saves some time than naming them individually.





What kind of automation have to be used for this?


Comments

  1. I don't use any automatism of the kind.
    I see no point in assigning request variables to global variables automatically.
    If it's one or two variables, I could deal with them manually.
    If there are more, I'd rather keep them as array members for the convenient handling.

    Yet I am using some sort of whitelisting approach similar to yours.
    but not to create global variables out of POST data but to add that data into SQL query.

    Like in this simple helper function to produce SET statement:

    function dbSet($fields) {
    $set='';
    foreach ($fields as $field) {
    if (isset($_POST[$field])) {
    $set.="`$field`='".mysql_real_escape_string($_POST[$field])."', ";
    }
    }
    return substr($set, 0, -2);
    }

    $id = intval($_POST['id']);
    $fields = explode(" ","name surname lastname address zip fax phone");
    $query = "UPDATE $table SET ".dbSet($fields)." stamp=NOW() WHERE id=$id";

    ReplyDelete
  2. You can save even more time by not extrating them at all. Just use them from the $_GET array. The advantages of this are not just avoiding collision with script variables (or worse) but also that you don't have to update that "automatism" when you add request parameters.

    When I am working with POST data, as from a form, I often process each explicitly:

    $data = array();
    $data['field1'] = someSaniFunction($_POST['field1']);
    $data['field2'] = someOtherFunction($_POST['field2']);
    ...


    In this way I ensure that each field is properly handled, and only the fields I expect are touched.

    ReplyDelete
  3. In my experience, you shouldn't transform data in the $_REQUEST array into variables using $$ as it gives the possibility of overwriting variables held within the current scope.

    Instead, you should consider having a request object or array in which you filter the data and only access named variables that you require. This way, you do not have to keep extending your allowed variable names and still maintain security.

    The ZF for example has a request object, and they recommend using a input filter when working on this data:
    http://framework.zend.com/manual/en/zend.filter.input.html

    ReplyDelete
  4. You can use the extract function in a more secure way:

    extract($_REQUEST, EXTR_SKIP);


    This will not overwrite variables that already exist in your code. See here for other parameters you can use

    ReplyDelete

Post a Comment

Popular posts from this blog

Slow Android emulator

I have a 2.67 GHz Celeron processor, 1.21 GB of RAM on a x86 Windows XP Professional machine. My understanding is that the Android emulator should start fairly quickly on such a machine, but for me it does not. I have followed all instructions in setting up the IDE, SDKs, JDKs and such and have had some success in staring the emulator quickly but is very particulary. How can I, if possible, fix this problem?

CCNA 1 Final Exam 2011 latest (hot hot hot)

  Hi! I have been posted content of ccna1 final exam (latest and only question.) I will post the answer and insert image on sunday. If you care, please subscribe your email an become a first person have full test content. Subcribe now  Some question  have not content because this question have images content. So that can you wait for me? SUNDAY 1. A user sees the command prompt: Router(config-if)# . What task can be performed at this mode? Reload the device. Perform basic tests. Configure individual interfaces. Configure individual terminal lines. 2. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL leaving...