Backend Development
PHP Problem
In three minutes, you will learn about the dangerous functions you need to pay attention to when operating user-submitted content in PHP.This article will introduce you to the dangerous functions that you need to pay attention to when operating user-submitted content in PHP. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.

For our program development, user input is the first entry point to solve security problems. Why do you say that? Whether it is SQL injection, XSS or file upload vulnerabilities, they are all related to the input parameters submitted by the user. Today we will not talk about these issues. We will mainly discuss the following user input. There are some dangerous functions that cannot be directly used for operations without verification, such as:
include($g);
Assumption This $g is the content submitted by the user. We use this parameter directly to include the file without verification. The parameter we pass is ?g=/etc/passwd, then all user account information on the server is likely to be It was leaked directly.
In addition, some functions that execute shell commands are extremely dangerous.
echo system($g);
When the parameter we pass is ?g=ls -la /, the same server directory is also displayed. This only shows the directory structure. If other more terrifying commands are used, the consequences will be disastrous.
Similarly, we often operate files based on some IDs or specified file names, especially when deleting files. If we do not make a judgment, we may directly delete some very important files.
unlink('./' . $g);
We continue to construct $g as ?g=../../../xxxx. If permissions allow, various system files can be deleted.
Regarding these contents, in fact, some good suggestions have been given in the official PHP manual. We might as well take a look directly at what the PHP manual says.
The major weaknesses in many PHP programs are not problems with the PHP language itself, but are caused by programmers' low security awareness. Therefore, you must always pay attention to possible problems in each piece of code to discover the possible impact of incorrect data submission.
Always pay attention to your code to ensure that every variable submitted from the client is properly checked, and then ask yourself some questions:
This script Can it only affect the intended files?
Can abnormal data have any effect after being submitted?
Can this script be used for unintended purposes?
Can this script be combined with other scripts to do bad things?
Are all transactions adequately recorded?
Also consider turning off register_globals, magic_quotes or other settings that make programming more convenient but will confuse the legality, source and value of a variable. During development, you can use the error_reporting(E_ALL) mode to help check whether variables have been checked or initialized before use, so as to prevent some abnormal data from being messed up.
In fact, as long as these suggestions are followed, most safety problems can be solved. Again, you cannot trust any user output. Please do various verifications during testing, including but not limited to boundary values, special symbols, special commands, out-of-bounds values, directory permissions, etc. Do not use user input as direct parameters for files, script execution, and file operations unless necessary. If you must use it, you must perform various forms of filtering and verification.
Test code:
[https://github.com/zhangyue05...
Recommended learning: php video tutorial
The above is the detailed content of In three minutes, you will learn about the dangerous functions you need to pay attention to when operating user-submitted content in PHP.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

SublimeText3 Linux new version
SublimeText3 Linux latest version

SublimeText3 Chinese version
Chinese version, very easy to use

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.





