[AppDb] [2/3] safe functions
cmorgan at alum.wpi.edu
Mon Jun 26 12:36:08 CDT 2006
On Monday 26 June 2006 12:29 pm, Jonathan Ernst wrote:
> Le lundi 26 juin 2006 à 11:54 -0400, Chris Morgan a écrit :
> > [...]
> > The most effective solution involves both filtering and sql protection.
> > The first layer of protection is to filter each input variable down to
> > the most restrictive data we can accept.
> > The next step is to ensure that each query, independent of the data
> > passed in, is safe because of the appropriate quoting.
> > With both of these layers in place we can be pretty sure that injection
> > and other attacks on the code will be much less effective. We could
> > probably be secure with only the sql protection in place but the
> > filtering raises the bar greatly for any potential exploits of sql or any
> > other logic in the appdb.
> IMHO SQL protection (mysql_real_escape_string()) and correct database
> design (ex. if we want integer make the field integer, an sql query with
> something else will fail), along with data filtering when we display
> user submitted data that doesn't come from database gives the same
> protection (both SQL and HTML injection) without making the code
> unreadable and having to copy strings everywhere and have is_integer(),
> is_empty(), whatever checks everywhere.
People who write books about php security disagree:
> > > > Also, I've submitted a patch for review to appdb at winehq.com and
> > > > wine-patches at winehq.com that removes all of our
> > > > get_magic_quotes_gpc() use and adds a check in include/incl.php that
> > > > warns and prevents appdb from running if magic quotes is enabled. So
> > > > you shouldn't need to have any get_magic_quotes_gpc() checks anymore.
> > >
> > > Isn't it better to support both configurations ? My solution works with
> > > or without magic quotes.
> > I don't believe so. If you read the patch that I submitted or look in
> > include/incl.php you'll see the reasoning behind not bothering with magic
> > quotes.
> > echo "No! <b>addslashes()</b> isn't adequate. You should use
> > <b>mysql_real_escape_string()</b> or some other function";
> > echo " that will handle multi-byte characters. See <a
> > href=\"http://shiflett.org/archive/184\">this article</a>"; echo " for a
> > way to exploit <b>addslash()</b>ed parameters.<br/><br/>";
> My function does just that.
Ahh I see, you were addslash()ing the html stuff.
> > echo "A second reason is that with magic quotes enabled, due to the
> > use of <b>mysql_real_escape_string()</b> to"; echo " protect from sql
> > injection attacks we'll end up with variables that have been addslash()ed
> > and"; echo " <b>mysql_real_escape_string()</b>ed. So you end up having
> > to call stripslashes() on EVERY variable. ";
> No big deal, my function stripslashes only when magic quotes are enabled so
> the only drawback of having magic_quotes enabled is that the AppDB is
> theoretically a bit slower because we have to make a stripslashes
> before applying mysql_real_escape_string if someone wishes to let
> magic_quotes enabled.
> > > > I also noticed your quote_smart_sql() call. This call isn't used
> > > > anywhere, we shouldn't add calls to functions that aren't called. We
> > >
> > > It is used in 3/3.
> > >
> > > > also already have a function that will make sql calls safe called
> > > > query_paramters() in include/db.php. Also, do we want to strip tags
> > > > from sql? Won't that remove all tags from things like app/version
> > > > descriptions, comments and notes?
> > >
> > > No, there is a parameter in this function (quote_smart_sql). By default
> > > we don't remove html, but for some fields we might want to filter out
> > > html (comment titles, etc.)
> > Ahh I see.
> Some questions :
> - Will you apply my coding_standards patch ?
> - Will you apply my show_error_page patch ?
> - Will you refuse my proposed way of securing the AppDB ? (I need to
> know because I'm willing to cleanup the rest of the AppDB regarding this
> issue (and others) but I don't want to send more patches if they will be
coding standard patch has been applied. It was in the queue to be but was
busy with other appdb things.
show_error_page patch is behind the sql injection patches that are higher
Securing the appdb is going to be done in two layers like current experts in
the field such as Chris Shiflett and others recommend.
The first layer is proper filtering of data, see php.net/filter. Filtering
data should ensure that only appropriately typed and valued data can even get
into use If we can't get this extension on the server, and I've emailed
Jeremy Newman a few times about this without any response, then we should
implement our own class that implements just what we need but uses the same
syntax and parameter values. This way if we upgrade to php >= 5.2 we'll be
able to switch over without much trouble.
The second layer is the use of query_parameters() for all sql queries. This
encapsulates the function we will use to protect each parameter and matches
the formatting used in pear db. Making the user call sprintf() and
quote_smart_sql() breaks encapsulation and is more complex than the
query_parameters() way of doing things. sprintf() also lacks the
functionality of the ?, ~ and & characters that query_parameters() supports.
query_parameters() also matches the use of prepared statements that we may
want to use in the future to speed up sql queries.
Today the final piece of the second layer is nearly completed and in place so
this part of your patches seems to overlap a cleaner and completed way of
fixing sql injection issues.
Fixing the filtering layer may or may not have been started yet by EA but
we'll want to get something to replace makeSafe() with that lines up with
php's filter extension.
More information about the wine-devel