securing php
play

Securing PHP Survey of the solutions Stanislav Malyshev - PowerPoint PPT Presentation

Securing PHP Survey of the solutions Stanislav Malyshev stas@zend.com Most code is extremely buggy Can we help? Input filtering Unauthorized code (remote include) Unauthorized DB access (SQL Injection) Client subversion (XSS,


  1. Securing PHP Survey of the solutions Stanislav Malyshev stas@zend.com

  2. Most code is extremely buggy… Can we help?

  3. Input filtering • Unauthorized code (remote include) • Unauthorized DB access (SQL Injection) • Client subversion (XSS, XSRF)

  4. Let’s protect all data Magic quotes: ☺ a.php?data=1’2 -> $data == “1\’2” can be inside quotes � Optional � No support for context

  5. Let’s restrict the user Safe mode: ☺ Allow access only to own files ☺ Allow only “safe” actions � No OS support � Too many modules not controlled � Too hard to find out all “unsafe” ones and not kill apps

  6. Let’s filter ☺ $var = filter_input(INPUT_GET, 'var'); ☺ Standard filters for standard use-cases � No time machine � Voluntary

  7. Let’s watch the data Data tainting ☺ No unfiltered data in sensitive contexts � How do I know the filtering was right? � Complex implementation – contexts � Performance

  8. Static vs. Dynamic Static Dynamic ☺ Can be as slow as it ☺ Real code, real data needs to ☺ Can prevent attack ☺ False positive OK ☺ External engine � $$foo = $$bar � Need for speed � $foo->$bar($baz) � Engine modification � eval($foo.$bar) � Breaks applications

  9. Let’s watch the data - II CSSE ☺ Track each character of data ☺ Ensure the data is safely � Safety is context-dependant � Modification for all operations � Performance?

  10. Let’s watch the input & learn Runtime detection ☺ No need to study application ☺ No need to study context � Complex heuristics � Needs data collection

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend