aszone /
search-hacking
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | /** |
||
| 3 | * Created by PhpStorm. |
||
| 4 | * User: lenon |
||
| 5 | * Date: 03/04/16 |
||
| 6 | * Time: 19:24. |
||
| 7 | */ |
||
| 8 | |||
| 9 | namespace Aszone\SearchHacking; |
||
| 10 | |||
| 11 | use Symfony\Component\DomCrawler\Crawler; |
||
| 12 | use Aszone\FakeHeaders\FakeHeaders; |
||
| 13 | use GuzzleHttp\Client; |
||
| 14 | |||
| 15 | class Utils |
||
| 16 | { |
||
| 17 | View Code Duplication | public static function sanitazeLinks($links = array()) |
|
| 18 | { |
||
| 19 | $hrefs = array(); |
||
| 20 | |||
| 21 | if (!empty($links)) { |
||
| 22 | foreach ($links as $keyLink => $valueLink) { |
||
| 23 | $url = static::clearLink($valueLink->getAttribute('href')); |
||
| 24 | $validResultOfBlackList = static::checkBlacklist($url); |
||
| 25 | |||
| 26 | if (!$validResultOfBlackList and $url) { |
||
| 27 | $hrefs[] = $url; |
||
| 28 | } |
||
| 29 | } |
||
| 30 | |||
| 31 | $hrefs = array_unique($hrefs); |
||
| 32 | } |
||
| 33 | |||
| 34 | return $hrefs; |
||
| 35 | } |
||
| 36 | |||
| 37 | public static function checkBlacklist($url = '') |
||
| 38 | { |
||
| 39 | if (!empty($url)) { |
||
| 40 | $validXmlrpc = preg_match("/(https?\:\/\/|^)(.+?)\//", $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
|
|||
| 41 | $url = ''; |
||
| 42 | |||
| 43 | if (isset($matches[2][0])) { |
||
| 44 | $url = $matches[2][0]; |
||
| 45 | } |
||
| 46 | |||
| 47 | $ini_blakclist = parse_ini_file(__DIR__.'/../resources/Blacklist.ini'); |
||
| 48 | |||
| 49 | $key = array_search($url, $ini_blakclist); |
||
| 50 | |||
| 51 | if ($key != false) { |
||
| 52 | return true; |
||
| 53 | } |
||
| 54 | } |
||
| 55 | |||
| 56 | return false; |
||
| 57 | } |
||
| 58 | |||
| 59 | public static function clearLink($url = '') |
||
| 60 | { |
||
| 61 | if (!empty($url)) { |
||
| 62 | $validXmlrpc = preg_match('/search%3Fq%3Dcache:.+?:(.+?)%252B/', $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
$validXmlrpc is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 63 | |||
| 64 | if (isset($matches[1][0])) { |
||
| 65 | return $matches[1][0]; |
||
| 66 | } |
||
| 67 | |||
| 68 | $validXmlrpc = preg_match("/search\?q=cache:.+?:(.+?)\+/", $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
$validXmlrpc is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 69 | |||
| 70 | if (isset($matches[1][0])) { |
||
| 71 | return $matches[1][0]; |
||
| 72 | } |
||
| 73 | |||
| 74 | $validXmlrpc = preg_match('/url=(.*?)&tld/', $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
$validXmlrpc is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 75 | |||
| 76 | if (isset($matches[1][0])) { |
||
| 77 | return urldecode($matches[1][0]); |
||
| 78 | } |
||
| 79 | |||
| 80 | //Msn Bing |
||
| 81 | $validXmlrpc = preg_match("/^((http|https):\/\/|www).+?\/?ld=.+?\&u=(.+?)\n/", $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
$validXmlrpc is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 82 | |||
| 83 | if (isset($matches[1][0])) { |
||
| 84 | return urldecode($matches[1][0]); |
||
| 85 | } |
||
| 86 | |||
| 87 | $validXmlrpc = preg_match("/^((http|https):\/\/|www)(.+?)\//", $url, $matches, PREG_OFFSET_CAPTURE); |
||
|
0 ignored issues
–
show
$validXmlrpc is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 88 | |||
| 89 | if (isset($matches[0][0])) { |
||
| 90 | $check[] = strpos($url, 'www.blogger.com'); |
||
| 91 | $check[] = strpos($url, 'youtube.com'); |
||
| 92 | $check[] = strpos($url, '.google.'); |
||
| 93 | $check[] = strpos($url, 'yandex.ru'); |
||
| 94 | $check[] = strpos($url, 'microsoft.com'); |
||
| 95 | $check[] = strpos($url, 'microsofttranslator.com'); |
||
| 96 | $check[] = strpos($url, '.yahoo.com'); |
||
| 97 | $check[] = strpos($url, 'yahoo.uservoice.com'); |
||
| 98 | $check[] = strpos($url, 'www.mozilla.org'); |
||
| 99 | $check[] = strpos($url, 'www.facebook.com'); |
||
| 100 | $check[] = strpos($url, 'go.mail.ru'); |
||
| 101 | $check[] = strpos($url, '/search/srpcache?p='); |
||
| 102 | $check[] = strpos($url, 'flickr.com'); |
||
| 103 | |||
| 104 | $tmp = array_filter($check); |
||
| 105 | |||
| 106 | if (empty($tmp)) { |
||
| 107 | return trim($url); |
||
| 108 | } |
||
| 109 | } |
||
| 110 | } |
||
| 111 | |||
| 112 | return false; |
||
| 113 | } |
||
| 114 | |||
| 115 | public static function getLinks($body) |
||
| 116 | { |
||
| 117 | $crawler = new Crawler($body); |
||
| 118 | |||
| 119 | return $crawler->filter('a'); |
||
| 120 | } |
||
| 121 | |||
| 122 | public static function getBody($urlOfSearch, $proxy) |
||
| 123 | { |
||
| 124 | $header = new FakeHeaders(); |
||
| 125 | $valid = true; |
||
|
0 ignored issues
–
show
$valid is not used, you could remove the assignment.
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently. $myVar = 'Value';
$higher = false;
if (rand(1, 6) > 3) {
$higher = true;
} else {
$higher = false;
}
Both the Loading history...
|
|||
| 126 | |||
| 127 | try { |
||
| 128 | $client = new Client([ |
||
| 129 | 'defaults' => [ |
||
| 130 | 'headers' => ['User-Agent' => $header->getUserAgent()], |
||
| 131 | 'proxy' => $proxy, |
||
| 132 | 'timeout' => 60, |
||
| 133 | ], |
||
| 134 | ]); |
||
| 135 | |||
| 136 | return $client->get($urlOfSearch)->getBody()->getContents(); |
||
| 137 | } catch (\Exception $e) { |
||
| 138 | $message = 'ERROR : '.$e->getMessage()."\n"; |
||
| 139 | |||
| 140 | if ($proxy == false) { |
||
| 141 | $message .= "Your ip is blocked, we are using proxy at now...\n"; |
||
| 142 | } |
||
| 143 | |||
| 144 | return $message; |
||
| 145 | } |
||
| 146 | |||
| 147 | return false; |
||
|
0 ignored issues
–
show
return false; does not seem to be reachable.
This check looks for unreachable code. It uses sophisticated control flow analysis techniques to find statements which will never be executed. Unreachable code is most often the result of function fx() {
try {
doSomething();
return true;
}
catch (\Exception $e) {
return false;
}
return false;
}
In the above example, the last Loading history...
|
|||
| 148 | } |
||
| 149 | |||
| 150 | public static function getBodyByVirginProxies($urlOfSearch, $urlProxie, $proxy) |
||
| 151 | { |
||
| 152 | $header = new FakeHeaders(); |
||
| 153 | |||
| 154 | echo 'Proxy : '.$urlProxie."\n"; |
||
| 155 | |||
| 156 | $dataToPost = ['body' => ['url' => $urlOfSearch]]; |
||
| 157 | |||
| 158 | $valid = true; |
||
| 159 | while ($valid == true) { |
||
| 160 | try { |
||
| 161 | $client = new Client([ |
||
| 162 | 'defaults' => [ |
||
| 163 | 'headers' => ['User-Agent' => $header->getUserAgent()], |
||
| 164 | 'proxy' => $proxy, |
||
| 165 | 'timeout' => 60, |
||
| 166 | ], |
||
| 167 | ]); |
||
| 168 | |||
| 169 | $res = $client->post($urlProxie, $dataToPost); |
||
| 170 | $body = $res->getBody()->getContents(); |
||
| 171 | |||
| 172 | //check if change new tor ip |
||
| 173 | $valid = false; |
||
| 174 | } catch (\Exception $e) { |
||
| 175 | echo 'ERROR : '.$e->getMessage()."\n"; |
||
| 176 | if ($proxy == false) { |
||
| 177 | echo "This ip of virgin proxy is blocked, we are using proxy at now...\n"; |
||
| 178 | } |
||
| 179 | |||
| 180 | return 'repeat'; |
||
| 181 | } |
||
| 182 | } |
||
| 183 | |||
| 184 | return $body; |
||
| 185 | } |
||
| 186 | } |
||
| 187 |
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently.
Both the
$myVarassignment in line 1 and the$higherassignment in line 2 are dead. The first because$myVaris never used and the second because$higheris always overwritten for every possible time line.