Conditions | 4 |
Paths | 3 |
Total Lines | 25 |
Code Lines | 13 |
Lines | 0 |
Ratio | 0 % |
Changes | 0 |
1 | <?php |
||
24 | public function getResponse($packageRoot, Request $request) |
||
25 | { |
||
26 | $packageRoot = rtrim($packageRoot, '/'); |
||
27 | $path = $packageRoot . '/Route/' . $request->route() . '/' . $request->method() . '.php'; |
||
28 | if (file_exists($path)) { |
||
29 | require $path; |
||
30 | $controllerClass = $this->nonsense($request->package() . '\\Route_' . str_replace('/', '_', $request->route()) . '\\' . $request->method()); |
||
31 | /** |
||
32 | * @var BaseController $controller |
||
33 | */ |
||
34 | $controller = new $controllerClass($packageRoot, $request); |
||
|
|||
35 | |||
36 | /** |
||
37 | * Call handler. |
||
38 | */ |
||
39 | $handler = $_POST['handler'] ?? $_GET['handler'] ?? 'index'; |
||
40 | if (preg_match('/[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*/', $handler) && method_exists($controllerClass, $handler)) { |
||
41 | $handler = $this->nonsense($handler); |
||
42 | $controller->$handler(); |
||
43 | return $controller->getResponse(); |
||
44 | } |
||
45 | } |
||
46 | |||
47 | return null; |
||
48 | } |
||
49 | |||
54 | } |
$controllerClass
can contain request data and is used in code execution context(s) leading to a potential security vulnerability.1 path for user data to reach this point
REQUEST_URI
from$_SERVER,
and$url
is assignedin src/Core/Request.php on line 26
$url
is passed through explode(), and$url
is assignedin src/Core/Request.php on line 34
$url
is assignedin src/Core/Request.php on line 35
$url
is passed through trim(), andtrim($url)
is passed through trim(), and$url
is assignedin src/Core/Request.php on line 36
$url
is passed through explode(), and$partList
is assignedin src/Core/Request.php on line 38
$partList
is passed through implode(), and Request::$route is assignedin src/Core/Request.php on line 67
in src/Core/Request.php on line 146
$request->route()
is passed through str_replace(), and$controllerClass
is assignedin src/Core/DefaultRoute.php on line 30
General Strategies to prevent injection
In general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
For numeric data, we recommend to explicitly cast the data: