This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | |||
| 3 | namespace Helix\Socket\WebSocket; |
||
| 4 | |||
| 5 | use Generator; |
||
| 6 | |||
| 7 | /** |
||
| 8 | * Reads frames from the peer. |
||
| 9 | * |
||
| 10 | * https://tools.ietf.org/html/rfc6455#section-5 |
||
| 11 | * |
||
| 12 | * TODO: Support unmasked frames. |
||
| 13 | */ |
||
| 14 | class FrameReader { |
||
| 15 | |||
| 16 | /** |
||
| 17 | * https://tools.ietf.org/html/rfc6455#section-5.2 |
||
| 18 | */ |
||
| 19 | protected const REGEXP = |
||
| 20 | //op((char )|(short )|(bigint ))(mask ) |
||
| 21 | '/^.([\x80-\xfd]|\xfe(?<n>..)|\xff(?<J>.{8}))(?<mask>.{4})/s'; |
||
| 22 | |||
| 23 | /** |
||
| 24 | * Peer read buffer. |
||
| 25 | * |
||
| 26 | * @var string |
||
| 27 | */ |
||
| 28 | protected $buffer = ''; |
||
| 29 | |||
| 30 | /** |
||
| 31 | * @var WebSocketClient |
||
| 32 | */ |
||
| 33 | protected $client; |
||
| 34 | |||
| 35 | /** |
||
| 36 | * Frame header buffer. |
||
| 37 | * |
||
| 38 | * @var null|array |
||
| 39 | */ |
||
| 40 | protected $header; |
||
| 41 | |||
| 42 | /** |
||
| 43 | * Maximum inbound per-frame payload length (fragment). |
||
| 44 | * |
||
| 45 | * Must be greater than or equal to `125` |
||
| 46 | * |
||
| 47 | * Defaults to 128 KiB. |
||
| 48 | * |
||
| 49 | * https://tools.ietf.org/html/rfc6455#section-5.2 |
||
| 50 | * |
||
| 51 | * @var int |
||
| 52 | */ |
||
| 53 | protected $maxLength = 128 * 1024; |
||
| 54 | |||
| 55 | /** |
||
| 56 | * RSV bit mask claimed by extensions. |
||
| 57 | * |
||
| 58 | * @var int |
||
| 59 | */ |
||
| 60 | protected $rsv = 0; |
||
| 61 | |||
| 62 | /** |
||
| 63 | * @param WebSocketClient $client |
||
| 64 | */ |
||
| 65 | public function __construct (WebSocketClient $client) { |
||
| 66 | $this->client = $client; |
||
| 67 | } |
||
| 68 | |||
| 69 | /** |
||
| 70 | * Reads and returns a single pending frame from the buffer, or nothing. |
||
| 71 | * |
||
| 72 | * @return null|Frame |
||
| 73 | * @throws WebSocketError |
||
| 74 | */ |
||
| 75 | protected function getFrame (): ?Frame { |
||
| 76 | // wait for the header |
||
| 77 | if (!$this->header ??= $this->getFrame_header()) { |
||
|
0 ignored issues
–
show
Bug
introduced
by
Loading history...
|
|||
| 78 | return null; |
||
| 79 | } |
||
| 80 | |||
| 81 | // wait for the whole frame |
||
| 82 | $length = $this->header['length']; |
||
| 83 | if (strlen($this->buffer) < $length) { |
||
| 84 | return null; |
||
| 85 | } |
||
| 86 | |||
| 87 | // extract the payload |
||
| 88 | $payload = substr($this->buffer, 0, $length); |
||
| 89 | |||
| 90 | // chop the buffer |
||
| 91 | $this->buffer = substr($this->buffer, $length); |
||
| 92 | |||
| 93 | // unmask the payload |
||
| 94 | $mask = $this->header['mask']; |
||
| 95 | for ($i = 0; $i < $length; $i++) { |
||
| 96 | $payload[$i] = chr(ord($payload[$i]) ^ $mask[$i % 4]); |
||
| 97 | } |
||
| 98 | |||
| 99 | // construct the frame instance |
||
| 100 | $frame = $this->newFrame($payload); |
||
| 101 | |||
| 102 | // destroy the header buffer |
||
| 103 | $this->header = null; |
||
| 104 | |||
| 105 | // return the frame |
||
| 106 | return $frame; |
||
| 107 | } |
||
| 108 | |||
| 109 | /** |
||
| 110 | * https://tools.ietf.org/html/rfc6455#section-5.2 |
||
| 111 | * @return null|array |
||
| 112 | */ |
||
| 113 | protected function getFrame_header (): ?array { |
||
| 114 | if (!preg_match(self::REGEXP, $this->buffer, $match)) { |
||
| 115 | if (strlen($this->buffer) >= 14) { // max head room |
||
| 116 | throw new WebSocketError(Frame::CLOSE_PROTOCOL_ERROR, 'Bad frame.'); |
||
| 117 | } |
||
| 118 | return null; |
||
| 119 | } |
||
| 120 | |||
| 121 | // unpack the first two bytes |
||
| 122 | [, $b0, $b1] = unpack('C2', $match[0]); // 1-based indices |
||
| 123 | |||
| 124 | // convert the second byte into an unpack() format, or the actual length (sans the MASK bit). |
||
| 125 | // the unpack() format is also used as the length's named-group in the regexp match. |
||
| 126 | $len = [0xfe => 'n', 0xff => 'J'][$b1] ?? ($b1 & Frame::LEN); |
||
| 127 | |||
| 128 | // fill the header buffer |
||
| 129 | $header = [ |
||
| 130 | 'final' => $final = $b0 & Frame::FIN, |
||
| 131 | 'rsv' => $rsv = $b0 & Frame::RSV123, |
||
| 132 | 'opCode' => $opCode = $b0 & Frame::OP, |
||
| 133 | 'length' => $length = is_int($len) ? $len : unpack($len, $match[$len])[1], |
||
| 134 | 'mask' => array_values(unpack('C*', $match['mask'])), |
||
| 135 | ]; |
||
| 136 | |||
| 137 | // chop the peer buffer |
||
| 138 | $this->buffer = substr($this->buffer, strlen($match[0])); |
||
| 139 | |||
| 140 | // validate |
||
| 141 | if ($badRsv = $rsv & ~$this->rsv) { |
||
| 142 | $badRsv = str_pad(base_convert($badRsv >> 4, 10, 2), 3, '0', STR_PAD_LEFT); |
||
| 143 | throw new WebSocketError(Frame::CLOSE_PROTOCOL_ERROR, "Received unknown RSV bits: 0b{$badRsv}"); |
||
| 144 | } |
||
| 145 | elseif ($opCode >= Frame::OP_CLOSE) { |
||
| 146 | if ($opCode > Frame::OP_PONG) { |
||
| 147 | throw new WebSocketError(Frame::CLOSE_PROTOCOL_ERROR, "Received unsupported control frame ({$opCode})"); |
||
| 148 | } |
||
| 149 | elseif (!$final) { |
||
| 150 | throw new WebSocketError(Frame::CLOSE_PROTOCOL_ERROR, "Received fragmented control frame ({$opCode})"); |
||
| 151 | } |
||
| 152 | } |
||
| 153 | elseif ($opCode > Frame::OP_BINARY) { |
||
| 154 | throw new WebSocketError(Frame::CLOSE_PROTOCOL_ERROR, "Received unsupported data frame ({$opCode})"); |
||
| 155 | } |
||
| 156 | elseif ($length > $this->maxLength) { |
||
| 157 | throw new WebSocketError(Frame::CLOSE_TOO_LARGE, "Payload would exceed {$this->maxLength} bytes"); |
||
| 158 | } |
||
| 159 | |||
| 160 | // return the header |
||
| 161 | return $header; |
||
| 162 | } |
||
| 163 | |||
| 164 | /** |
||
| 165 | * Yields all available frames from the peer. |
||
| 166 | * |
||
| 167 | * @return Generator|Frame[] |
||
| 168 | */ |
||
| 169 | public function getFrames () { |
||
| 170 | // read into the buffer |
||
| 171 | $this->buffer .= $bytes = $this->client->recvAll(); |
||
| 172 | |||
| 173 | // check for peer disconnection |
||
| 174 | if (!strlen($bytes)) { |
||
| 175 | $this->client->close(); |
||
| 176 | } |
||
| 177 | |||
| 178 | // yield frames |
||
| 179 | while ($frame = $this->getFrame()) { |
||
| 180 | yield $frame; |
||
| 181 | } |
||
| 182 | } |
||
| 183 | |||
| 184 | /** |
||
| 185 | * @return int |
||
| 186 | */ |
||
| 187 | public function getMaxLength (): int { |
||
| 188 | return $this->maxLength; |
||
| 189 | } |
||
| 190 | |||
| 191 | /** |
||
| 192 | * @return int |
||
| 193 | */ |
||
| 194 | public function getRsv (): int { |
||
| 195 | return $this->rsv; |
||
| 196 | } |
||
| 197 | |||
| 198 | /** |
||
| 199 | * {@link Frame} factory. |
||
| 200 | * |
||
| 201 | * @param string $payload |
||
| 202 | * @return Frame |
||
| 203 | */ |
||
| 204 | protected function newFrame (string $payload): Frame { |
||
| 205 | return new Frame($this->header['final'], $this->header['rsv'], $this->header['opCode'], $payload); |
||
| 206 | } |
||
| 207 | |||
| 208 | /** |
||
| 209 | * @param int $bytes |
||
| 210 | * @return $this |
||
| 211 | */ |
||
| 212 | public function setMaxLength (int $bytes) { |
||
| 213 | $this->maxLength = min(max(125, $bytes), 2 ** 63 - 1); |
||
| 214 | return $this; |
||
| 215 | } |
||
| 216 | |||
| 217 | /** |
||
| 218 | * @param int $rsv |
||
| 219 | * @return $this |
||
| 220 | */ |
||
| 221 | public function setRsv (int $rsv) { |
||
| 222 | $this->rsv = $rsv; |
||
| 223 | return $this; |
||
| 224 | } |
||
| 225 | } |