$obj can contain request data and is used in request header context(s) leading to a potential security vulnerability.
7 paths for user data to reach this point
1. Path:
Read from $_REQUESTin ansible/ManagedSP/templates/web/index.php on line 26
Read from $_REQUEST
in
ansible/ManagedSP/templates/web/index.php on line 26
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
2. Path:
Read from $_REQUEST, and Data is passed through implode(), and cat_socket() is called
in ansible/ManagedSP/templates/web/index.php on line 25
Read from $_REQUEST, and Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
3. Path:
Read from $_REQUESTin ansible/ManagedSP/templates/web/index.php on line 27
Read from $_REQUEST
in
ansible/ManagedSP/templates/web/index.php on line 27
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
4. Path:
Read from $_REQUEST, and Data is passed through trim(), and trim($_REQUEST['operatorname']) is assigned to $opnin ansible/ManagedSP/templates/web/index.php on line 15
Read from $_REQUEST, and Data is passed through trim(), and trim($_REQUEST['operatorname']) is assigned to $opn
in
ansible/ManagedSP/templates/web/index.php on line 15
Data is passed through base64_encode()
in
ansible/ManagedSP/templates/web/index.php on line 29
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
5. Path:
Read from $_REQUEST, and Data is passed through base64_encode()in ansible/ManagedSP/templates/web/index.php on line 28
Read from $_REQUEST, and Data is passed through base64_encode()
in
ansible/ManagedSP/templates/web/index.php on line 28
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
6. Path:
Read from $_REQUEST, and Data is passed through trim(), and OPNAME_PREFIX . trim($_REQUEST['instid']) . '-' . trim($_REQUEST['deploymentid']) . OPNAME_SUFFIX is assigned to $opnin ansible/ManagedSP/templates/web/index.php on line 17
Read from $_REQUEST, and Data is passed through trim(), and OPNAME_PREFIX . trim($_REQUEST['instid']) . '-' . trim($_REQUEST['deploymentid']) . OPNAME_SUFFIX is assigned to $opn
in
ansible/ManagedSP/templates/web/index.php on line 17
Data is passed through base64_encode()
in
ansible/ManagedSP/templates/web/index.php on line 29
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
7. Path:
Read from $_REQUEST, and $_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan']) is assigned to $vlansin ansible/ManagedSP/templates/web/index.php on line 21
Read from $_REQUEST, and $_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan']) is assigned to $vlans
in
ansible/ManagedSP/templates/web/index.php on line 21
Data is passed through base64_encode()
in
ansible/ManagedSP/templates/web/index.php on line 30
Data is passed through implode(), and cat_socket() is called
in
ansible/ManagedSP/templates/web/index.php on line 25
Enters via parameter $obj
in
ansible/ManagedSP/templates/web/lib.inc on line 6
General Strategies to prevent injection
In general, it is advisable to prevent any user-data to reach this point. This can be done by
white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) {
throw new \InvalidArgumentException('This input is not allowed.');
}
For numeric data, we recommend to explicitly cast the data:
$obj
can contain request data and is used in request header context(s) leading to a potential security vulnerability.7 paths for user data to reach this point
$_REQUEST
in ansible/ManagedSP/templates/web/index.php on line 26$_REQUEST
in ansible/ManagedSP/templates/web/index.php on line 26
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST,
and Data is passed throughimplode()
, andcat_socket()
is called in ansible/ManagedSP/templates/web/index.php on line 25$_REQUEST,
and Data is passed throughimplode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST
in ansible/ManagedSP/templates/web/index.php on line 27$_REQUEST
in ansible/ManagedSP/templates/web/index.php on line 27
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST,
and Data is passed throughtrim()
, andtrim($_REQUEST['operatorname'])
is assigned to$opn
in ansible/ManagedSP/templates/web/index.php on line 15$_REQUEST,
and Data is passed throughtrim()
, andtrim($_REQUEST['operatorname'])
is assigned to$opn
in ansible/ManagedSP/templates/web/index.php on line 15
base64_encode()
in ansible/ManagedSP/templates/web/index.php on line 29
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST,
and Data is passed throughbase64_encode()
in ansible/ManagedSP/templates/web/index.php on line 28$_REQUEST,
and Data is passed throughbase64_encode()
in ansible/ManagedSP/templates/web/index.php on line 28
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST,
and Data is passed throughtrim()
, andOPNAME_PREFIX . trim($_REQUEST['instid']) . '-' . trim($_REQUEST['deploymentid']) . OPNAME_SUFFIX
is assigned to$opn
in ansible/ManagedSP/templates/web/index.php on line 17$_REQUEST,
and Data is passed throughtrim()
, andOPNAME_PREFIX . trim($_REQUEST['instid']) . '-' . trim($_REQUEST['deploymentid']) . OPNAME_SUFFIX
is assigned to$opn
in ansible/ManagedSP/templates/web/index.php on line 17
base64_encode()
in ansible/ManagedSP/templates/web/index.php on line 29
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
$_REQUEST,
and$_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan'])
is assigned to$vlans
in ansible/ManagedSP/templates/web/index.php on line 21$_REQUEST,
and$_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan'])
is assigned to$vlans
in ansible/ManagedSP/templates/web/index.php on line 21
base64_encode()
in ansible/ManagedSP/templates/web/index.php on line 30
implode()
, andcat_socket()
is calledin ansible/ManagedSP/templates/web/index.php on line 25
$obj
in ansible/ManagedSP/templates/web/lib.inc on line 6
General Strategies to prevent injection
In general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
For numeric data, we recommend to explicitly cast the data: