CWE-616 上传文件变量的不完整标识(PHP)

admin 2021年12月16日16:26:29评论53 views字数 2651阅读8分50秒阅读模式

CWE-616 上传文件变量的不完整标识(PHP)

Incomplete Identification of Uploaded File Variables (PHP)

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

The PHP application uses an old method for processing uploaded files by referencing the four global variables that are set for each file (e.g. $varname, $varname_size, $varname_name, $varname_type). These variables could be overwritten by attackers, causing the application to process unauthorized files.

扩展描述

These global variables could be overwritten by POST requests, cookies, or other methods of populating or overwriting these variables. This could be used to read or process arbitrary files by providing values such as "/etc/passwd".

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: PeerOf cwe_CWE_ID: 473 cwe_View_ID: 1000

适用平台

Language: {'cwe_Name': 'PHP', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity'] ['Read Files or Directories', 'Modify Files or Directories']

可能的缓解方案

Architecture and Design

策略:

Use PHP 4 or later.

Architecture and Design

策略:

If you must support older PHP versions, write your own version of is_uploaded_file() and run it against $HTTP_POST_FILES['userfile']))

Implementation

策略:

For later PHP versions, reference uploaded files using the $HTTP_POST_FILES or $_FILES variables, and use is_uploaded_file() or move_uploaded_file() to ensure that you are dealing with an uploaded file.

示例代码

As of 2006, the "four globals" method is probably in sharp decline, but older PHP applications could have this issue.

In the "four globals" method, PHP sets the following 4 global variables (where "varname" is application-dependent):

bad PHP

$varname = name of the temporary file on local machine
$varname_size = size of file
$varname_name = original name of file provided by client
$varname_type = MIME type of the file

"The global $_FILES exists as of PHP 4.1.0 (Use $HTTP_POST_FILES instead if using an earlier version). These arrays will contain all the uploaded file information."

bad PHP

$_FILES['userfile']['name'] - original filename from client
$_FILES['userfile']['tmp_name'] - the temp filename of the file on the server

** note: 'userfile' is the field name from the web form; this can vary.

分析过的案例

标识 说明 链接
CVE-2002-1460 Forum does not properly verify whether a file was uploaded or if the associated variables were set by POST, allowing remote attackers to read arbitrary files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1460
CVE-2002-1759 Product doesn't check if the variables for an upload were set by uploading the file, or other methods such as $_POST. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1759
CVE-2002-1710 Product does not distinguish uploaded file from other files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1710

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Incomplete Identification of Uploaded File Variables (PHP)
Software Fault Patterns SFP25 Tainted input to variable

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:26:29
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-616 上传文件变量的不完整标识(PHP)http://cn-sec.com/archives/613078.html

发表评论

匿名网友 填写信息