| Conditions | 4 |
| Paths | 3 |
| Total Lines | 25 |
| Code Lines | 13 |
| Lines | 0 |
| Ratio | 0 % |
| Changes | 0 | ||
| 1 | <?php |
||
| 24 | public function getResponse($packageRoot, Request $request) |
||
| 25 | { |
||
| 26 | $packageRoot = rtrim($packageRoot, '/'); |
||
| 27 | $path = $packageRoot . '/Route/' . $request->route() . '/' . $request->method() . '.php'; |
||
| 28 | if (file_exists($path)) { |
||
| 29 | require $path; |
||
| 30 | $controllerClass = $this->nonsense($request->package() . '\\Route_' . str_replace('/', '_', $request->route()) . '\\' . $request->method()); |
||
| 31 | /** |
||
| 32 | * @var BaseController $controller |
||
| 33 | */ |
||
| 34 | $controller = new $controllerClass($packageRoot, $request); |
||
|
|
|||
| 35 | |||
| 36 | /** |
||
| 37 | * Call handler. |
||
| 38 | */ |
||
| 39 | $handler = $_POST['handler'] ?? $_GET['handler'] ?? 'index'; |
||
| 40 | if (preg_match('/[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*/', $handler) && method_exists($controllerClass, $handler)) { |
||
| 41 | $handler = $this->nonsense($handler); |
||
| 42 | $controller->$handler(); |
||
| 43 | return $controller->getResponse(); |
||
| 44 | } |
||
| 45 | } |
||
| 46 | |||
| 47 | return null; |
||
| 48 | } |
||
| 49 | |||
| 54 | } |
$controllerClasscan contain request data and is used in code execution context(s) leading to a potential security vulnerability.1 path for user data to reach this point
REQUEST_URIfrom$_SERVER,and$urlis assignedin src/Core/Request.php on line 26
$urlis passed through explode(), and$urlis assignedin src/Core/Request.php on line 34
$urlis assignedin src/Core/Request.php on line 35
$urlis passed through trim(), andtrim($url)is passed through trim(), and$urlis assignedin src/Core/Request.php on line 36
$urlis passed through explode(), and$partListis assignedin src/Core/Request.php on line 38
$partListis passed through implode(), and Request::$route is assignedin src/Core/Request.php on line 67
in src/Core/Request.php on line 146
$request->route()is passed through str_replace(), and$controllerClassis assignedin src/Core/DefaultRoute.php on line 30
General Strategies to prevent injection
In general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) { throw new \InvalidArgumentException('This input is not allowed.'); }For numeric data, we recommend to explicitly cast the data: