Summary of common PHP code auditing Vulnerabilities

Source: Internet
Author: User

Summary of common PHP code auditing vulnerabilities, simple things, and bad things. You are welcome to point out that continuous learning and research can make continuous progress and stick to it, you will understand it one day. 1. the SQL injection vulnerability may exist in all areas that interact with the database. 2. file Inclusion Vulnerability include/include_once/require/require_once 3. XSS Cross-Site vulnerability check whether string input/output is processed 4. code Execution Vulnerability: PHP code execution vulnerability. Common vulnerabilities occur in dangerous functions. eval/preg_replace /... 5. Command Execution Vulnerability command execution vulnerability. Common vulnerabilities occur in dangerous functions. system/exec /... 6. this type of logical error vulnerability is widely used. It mainly depends on the programmer's ability to understand the Code. For example, a typical variable overwrites foreach (Array ('_ get',' _ Post ', '_ cookier') as $ _ request) {foreach ($ _ request as $ _ k => $ _ v) $ {$ _ k} = _ xxoo ($ _ v);} 7. doS Vulnerability exif_read_data/Glob /... 8. Variable Overwrite Vulnerability variable overwrite mainly triggers parse_str/$/mb_parse_str/… between logic problems and related sensitive functions /... 9. arbitrary File Reading is usually caused by File Read filtering, or file_get_contents/readfile /.. 10. arbitrary File Download www.2cto.com, which is common, is not strictly filtered. 11. arbitrary File Deletion is not strictly filtered. related sensitive functions include unlink/delete/session_destroy /.. 12. any file upload file type is not strictly filtered. For code logic problems, pay attention to move_uploaded_file 13. arbitrary File Write File write filtering loose file_put_contents/fwrite /.. 14. malformed Directory Creation often occurs when the Created directory is not filtered, which may easily lead to the creation of malformed directories, resulting in parsing vulnerability rename/mkdir /.. 15. COOKIE/SESSION spoofing mainly depends on the login authentication and permission verification methods. Sometimes, we can modify the cookie and change the role 16. the unauthorized operation vulnerability also involves permission verification. It is common for many programs to modify their own passwords. L The where = value after the statement is placed in the form. We can modify the value to achieve the effect of excessive permission....

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.