审计总结:PHP源码审计敏感函数字典

来源:互联网 发布:上海网络代运营公司 编辑:程序博客网 时间:2024/05/16 08:34

对涉及PHP安全方面的函数进行了归类,参照了很多文章和博客,在此表示感谢。
 
1.include/require/require_once/include_once/file_get_contents
2.exec/system/popen/passthru/proc_open/pcntl_exec/shell_exec
3.eval/preg_replace/assert/call_user_func/call_user_func_array/create_function
4._GET/_POST/_COOKIE/_SERVER/_REQUEST/_ENV/php://input/getenv/
5.session/cookie
6.extract/parse_str/mb_parse_str/import_request_variables/unserialize
7.copy/rmdir/chmod/delete/fwrite/fopen/readfile/fpassthru/move_uploaded_file/
file_put_contents/unlink/upload/opendir/fgetc/fgets/ftruncate/fputs/fputcs
8.select/insert/update/delete/order by/group by/limit/in(/stripslashes/urldecode
9.confirm_phpdoc_compiled/mssql_pconnect/mssql_connect/crack_opendict/
snmpget/ibase_connect
10.echo/print/printf/vprintf/document.write/document.innerHTML/document.innerHtmlText
11.phpinfo/highlight_file/show_source
12.iconv/mb_convert_encoding
附带php.ini中涉及安全配置选项。
 
 
safe_mode = off ( a lot of shit cannot be done with this on )
disabled_functions = N/A ( no one,we want all )
register_globals = on ( we can set variables by request )
allow_url_include = on ( for lfi/rfi )
allow_url_fopen = on ( for lfi/rfi )
magic_quotes_gpc = off ( this will escape ‘ ” and NUL’s with a backslash and we don’t want that )
short_tag_open = on ( some scripts are using short tags,better on )
file_uploads = on ( we want to upload )
display_errors = on ( we want to see the script errors,maybe some undeclared variables? )
open_basedir 限制访问目录
display_errors = off 显示错误信息



 在 PHP 中可由用户输入的变量 

?
1
2
3
4
5
6
7
8
9
10
11
12
13
$_SERVER
$_GET
$_POST
$_COOKIE
$_REQUEST
$_FILES
$_ENV
$_HTTP_COOKIE_VARS
$_HTTP_ENV_VARS
$_HTTP_GET_VARS
$_HTTP_POST_FILES
$_HTTP_POST_VARS
$_HTTP_SERVER_VARS



可能允许命令注入的函数 

?
1
2
3
4
5
6
7
8
system
exec
passthru
``
shell_exec
popen
proc_open
pcntl_exec



可能允许文件包含的函数 

?
1
2
3
4
5
6
7
8
9
10
include
include_once
require
require_once
show_source
highlight_file
readfile
file_get_contents
fopen
file



可能允许代码注入的函数

?
1
2
3
4
5
6
eval
preg_replace+/e
assert
call_user_func
call_user_func_array
create_function


可能允许SQL注入的 SQL语句函数 
insert 
delete 
update 
select 

可能允许攻击者恶意操作文件的函数 
?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
copy
rmdir
unlink
delete
fwrite
chmod
fgetc
fgetcsv
fgets
fgetss
file
file_get_contents
fread
readfile
ftruncate
file_put_contents
fputcsv
fputs

0 0
原创粉丝点击