shogodev /
argilla
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | /** |
||
| 3 | * Проверка БД с которой работает движок - доступы, настройки самой БД и т.д. |
||
| 4 | * @author Fedor A Borshev <[email protected]> |
||
| 5 | * @link https://github.com/shogodev/argilla/ |
||
| 6 | * @copyright Copyright © 2003-2014 Shogo |
||
| 7 | * @license http://argilla.ru/LICENSE |
||
| 8 | * @package build.tasks.checkDbTask |
||
| 9 | */ |
||
| 10 | |||
| 11 | require_once "phing/Task.php"; |
||
| 12 | |||
| 13 | class CheckDbTask extends Task |
||
| 14 | {
|
||
| 15 | /** |
||
| 16 | * @var boolean проверять доступ к триггерам |
||
| 17 | */ |
||
| 18 | private $checkTriggers; |
||
| 19 | |||
| 20 | /** |
||
| 21 | * @var boolean проверять доступ к созданию и просмотру структуры вьюх |
||
| 22 | */ |
||
| 23 | private $checkViews; |
||
| 24 | |||
| 25 | /** |
||
| 26 | * @var boolean проверять доступ к созданию и изменению хранимых процедур |
||
| 27 | */ |
||
| 28 | private $checkRoutines; |
||
| 29 | |||
| 30 | /** |
||
| 31 | * @var boolean проверять доступ к LOCK TABLES |
||
| 32 | */ |
||
| 33 | private $checkLockTables; |
||
| 34 | |||
| 35 | /** |
||
| 36 | * @var boolean проверять доступ к CREATE TMP TABLE |
||
| 37 | */ |
||
| 38 | private $checkTmpTable; |
||
| 39 | |||
| 40 | /** |
||
| 41 | * @var boolean проверять включен ли InnoDB |
||
| 42 | */ |
||
| 43 | private $checkInnoDb; |
||
| 44 | |||
| 45 | /** |
||
| 46 | * @var PDO |
||
| 47 | */ |
||
| 48 | private $pdo; |
||
| 49 | /** |
||
| 50 | * @var bool |
||
| 51 | */ |
||
| 52 | private $_connected = false; |
||
| 53 | |||
| 54 | private $_user; |
||
| 55 | private $_host; |
||
| 56 | private $_dbName; |
||
| 57 | |||
| 58 | /** |
||
| 59 | * @var PrivilegeChecker |
||
| 60 | */ |
||
| 61 | private $_privilegeChecker; |
||
| 62 | |||
| 63 | #region setters |
||
| 64 | public function setTriggers($val) |
||
| 65 | {
|
||
| 66 | $this->checkTriggers = $val; |
||
| 67 | } |
||
| 68 | |||
| 69 | public function setViews($val) |
||
| 70 | {
|
||
| 71 | $this->checkViews = $val; |
||
| 72 | } |
||
| 73 | |||
| 74 | public function setRoutines($val) |
||
| 75 | {
|
||
| 76 | $this->checkRoutines = $val; |
||
| 77 | } |
||
| 78 | |||
| 79 | public function setLockTables($val) |
||
| 80 | {
|
||
| 81 | $this->checkLockTables = $val; |
||
| 82 | } |
||
| 83 | |||
| 84 | public function setTmpTables($val) |
||
| 85 | {
|
||
| 86 | $this->checkTmpTable = $val; |
||
| 87 | } |
||
| 88 | |||
| 89 | public function setInnoDb($val) |
||
| 90 | {
|
||
| 91 | $this->checkInnoDb = $val; |
||
| 92 | } |
||
| 93 | |||
| 94 | #endregion |
||
| 95 | |||
| 96 | public function main() |
||
| 97 | {
|
||
| 98 | if( !$this->_connected ) |
||
| 99 | {
|
||
| 100 | $this->connect(); |
||
| 101 | } |
||
| 102 | |||
| 103 | try |
||
| 104 | {
|
||
| 105 | $this->_privilegeChecker = new PrivilegeChecker(PrivilegeChecker::getShowGrantsOutput($this->pdo)); |
||
| 106 | } |
||
| 107 | catch(Exception $e) |
||
| 108 | {
|
||
| 109 | if( strpos($e->getMessage(), 'The MySQL server is running with the --skip-grant-tables') !== false ) |
||
| 110 | {
|
||
| 111 | return; |
||
| 112 | } |
||
| 113 | else |
||
| 114 | {
|
||
| 115 | throw $e; |
||
| 116 | } |
||
| 117 | } |
||
| 118 | |||
| 119 | if( $this->checkTriggers ) |
||
| 120 | {
|
||
| 121 | $this->checkPrivilege(PrivilegeEnum::TRIGGER); |
||
| 122 | } |
||
| 123 | |||
| 124 | if( $this->checkViews ) |
||
| 125 | {
|
||
| 126 | $this->checkPrivilege(PrivilegeEnum::SHOW_VIEW); |
||
| 127 | $this->checkPrivilege(PrivilegeEnum::CREATE_VIEW); |
||
| 128 | } |
||
| 129 | |||
| 130 | if( $this->checkRoutines ) |
||
| 131 | {
|
||
| 132 | $this->checkPrivilege(PrivilegeEnum::CREATE_ROUTINE); |
||
| 133 | $this->checkPrivilege(PrivilegeEnum::ALTER_ROUTINE); |
||
| 134 | } |
||
| 135 | |||
| 136 | if( $this->checkLockTables ) |
||
| 137 | {
|
||
| 138 | $this->checkPrivilege(PrivilegeEnum::LOCK_TABLES); |
||
| 139 | } |
||
| 140 | |||
| 141 | if( $this->checkTmpTable ) |
||
| 142 | {
|
||
| 143 | $this->checkPrivilege(PrivilegeEnum::CREATE_TEMPORARY_TABLES); |
||
| 144 | } |
||
| 145 | |||
| 146 | if( $this->checkInnoDb ) |
||
| 147 | {
|
||
| 148 | $this->checkEngine('InnoDB');
|
||
| 149 | } |
||
| 150 | } |
||
| 151 | |||
| 152 | protected function checkPrivilege($privilege) |
||
| 153 | {
|
||
| 154 | if( !$this->hasPrivilege($privilege) ) |
||
| 155 | {
|
||
| 156 | throw new BuildException( |
||
| 157 | "Required DB privelege '{$privilege}' not granted for '{$this->_user}'@'{$this->_host}' on db '{$this->_dbName}'");
|
||
| 158 | } |
||
| 159 | } |
||
| 160 | |||
| 161 | protected function checkEngine($engine) |
||
| 162 | {
|
||
| 163 | $q = $this->pdo->query('SHOW ENGINES;');
|
||
| 164 | $q->execute(); |
||
| 165 | foreach($q as $row) |
||
| 166 | {
|
||
| 167 | if( $row['Engine'] == $engine and ($row['Support'] == 'YES' or $row['Support'] == 'DEFAULT') ) |
||
| 168 | return true; |
||
| 169 | } |
||
| 170 | throw new BuildException("Required Engine '$engine' is not supported by current DB driver");
|
||
| 171 | } |
||
| 172 | |||
| 173 | protected function hasPrivilege($privilege) |
||
| 174 | {
|
||
| 175 | return $this->_privilegeChecker->hasPrivilege($privilege, $this->_dbName, $this->_user, $this->_host); |
||
| 176 | } |
||
| 177 | |||
| 178 | private function connect() |
||
| 179 | {
|
||
| 180 | $dsn = $dsn = $this->project->getProperty('db.driver').':'.'host='.$this->project->getProperty('db.host');
|
||
| 181 | |||
| 182 | try |
||
| 183 | {
|
||
| 184 | $this->pdo = new PDO($dsn, |
||
| 185 | $this->project->getProperty('db.username'),
|
||
| 186 | $this->project->getProperty('db.password'));
|
||
| 187 | } |
||
| 188 | catch(PDOException $e) |
||
| 189 | {
|
||
| 190 | throw new BuildException("CheckDbPermissionsTask: Could not connect to PDO: $dsn");
|
||
| 191 | } |
||
| 192 | |||
| 193 | $this->_connected = true; |
||
| 194 | $this->_user = $this->project->getProperty('db.mysqlUser');
|
||
| 195 | $this->_host = $this->project->getProperty('db.mysqlHost');
|
||
| 196 | $this->_dbName = $this->project->getProperty('db.dbname');
|
||
| 197 | } |
||
| 198 | } |
||
| 199 | |||
| 200 | |||
| 201 | /** |
||
| 202 | * Привилегии. |
||
| 203 | */ |
||
| 204 | class PrivilegeEnum |
||
| 205 | {
|
||
| 206 | const TRIGGER = 'trigger'; |
||
| 207 | const SHOW_VIEW = 'show view'; |
||
| 208 | const CREATE_VIEW = 'create view'; |
||
| 209 | const CREATE_ROUTINE = 'create routine'; |
||
| 210 | const ALTER_ROUTINE = 'alter routine'; |
||
| 211 | const LOCK_TABLES = 'lock tables'; |
||
| 212 | const CREATE_TEMPORARY_TABLES = 'create temporary tables'; |
||
| 213 | } |
||
| 214 | |||
| 215 | |||
| 216 | /** |
||
| 217 | * Инкапсулиреут правила проверки привилегий. |
||
| 218 | */ |
||
| 219 | class PrivilegeChecker |
||
| 220 | {
|
||
| 221 | /** |
||
| 222 | * Возвращает результат команды SHOW GRANTS; |
||
| 223 | * |
||
| 224 | * @param PDO $connection Соединение с базой данных. |
||
| 225 | * |
||
| 226 | * @throws BadMethodCallException |
||
| 227 | * @return array Результат команды SHOW GRANTS; |
||
| 228 | */ |
||
| 229 | public static function getShowGrantsOutput(PDO $connection) |
||
| 230 | {
|
||
| 231 | if( !$query = $connection->query('SHOW GRANTS;') )
|
||
| 232 | {
|
||
| 233 | throw new BadMethodCallException($connection->errorInfo()[2], $connection->errorInfo()[1]); |
||
| 234 | } |
||
| 235 | |||
| 236 | return $query->fetchAll(); |
||
| 237 | } |
||
| 238 | |||
| 239 | /** |
||
| 240 | * @var string[] Массив GRANT команд. |
||
| 241 | */ |
||
| 242 | private $_showGrantsOutput; |
||
| 243 | |||
| 244 | /** |
||
| 245 | * Создает новый объект для проверки привилегий в базе данных для пользователя. |
||
| 246 | * |
||
| 247 | * @param string[] $showGrantsRawOutput Результат команды SHOW GRANTS; |
||
| 248 | */ |
||
| 249 | public function __construct(array $showGrantsRawOutput) |
||
| 250 | {
|
||
| 251 | $this->_showGrantsOutput = $this->preprocess($showGrantsRawOutput); |
||
|
0 ignored issues
–
show
|
|||
| 252 | } |
||
| 253 | |||
| 254 | /** |
||
| 255 | * Проверает наличие указанной привилегии для определенного пользователя и хоста. |
||
| 256 | * |
||
| 257 | * @param string $privilege Название привилегии (см. PrivilegeEnum) |
||
| 258 | * @param string $db Имя базы данных. |
||
| 259 | * @param string $user Имя пользователя. |
||
| 260 | * @param string $host Имя хоста. |
||
| 261 | * |
||
| 262 | * @return bool true в случае наличия привилегии, иначе false. |
||
| 263 | */ |
||
| 264 | public function hasPrivilege($privilege, $db, $user, $host) |
||
| 265 | {
|
||
| 266 | try |
||
| 267 | {
|
||
| 268 | $grantQuery = $this->findRow($this->_showGrantsOutput, $db, $user, $host); |
||
| 269 | } |
||
| 270 | catch(UnexpectedValueException $e) |
||
| 271 | {
|
||
| 272 | return false; |
||
| 273 | } |
||
| 274 | |||
| 275 | return $this->checkPrivilege($grantQuery, $privilege); |
||
| 276 | } |
||
| 277 | |||
| 278 | /** |
||
| 279 | * Выполняет предварительную обработку для результата команды SHOW GRANTS; |
||
| 280 | * |
||
| 281 | * @param string $showGrantsRawOutput Результат команды SHOW GRANTS; |
||
| 282 | * |
||
| 283 | * @return string[] Массив GRANT команд. |
||
| 284 | */ |
||
| 285 | private function preprocess($showGrantsRawOutput) |
||
| 286 | {
|
||
| 287 | return array_map(function (array $rowAsArray) |
||
| 288 | {
|
||
| 289 | return reset($rowAsArray); |
||
| 290 | }, $showGrantsRawOutput); |
||
| 291 | } |
||
| 292 | |||
| 293 | /** |
||
| 294 | * Отыскивает строку, содержащую GRANT команду, для указанного пользователя и хоста. |
||
| 295 | * |
||
| 296 | * @param string[] $grantCommands Все GRANT команды. |
||
| 297 | * @param string $db Имя базы данных. |
||
| 298 | * @param string $user Имя пользователя. |
||
| 299 | * @param string $host Имя хоста. |
||
| 300 | * |
||
| 301 | * @throws UnexpectedValueException Бросается если GRANT команда для указанного пользователя и хоста не найдена. |
||
| 302 | * @return string GRANT команда для указанного пользователя и хоста. |
||
| 303 | */ |
||
| 304 | private function findRow(array $grantCommands, $db, $user, $host) |
||
| 305 | {
|
||
| 306 | $candidates = array_filter($grantCommands, function ($row) use ($db, $user, $host) |
||
| 307 | {
|
||
| 308 | /** @var $row string */ |
||
| 309 | if( stripos($row, 'GRANT USAGE ON') !== false ) |
||
| 310 | {
|
||
| 311 | return false; |
||
| 312 | } |
||
| 313 | |||
| 314 | return preg_match("/('{$user}'@'{$host}')|('{$user}'@'%')/", $row);
|
||
| 315 | }); |
||
| 316 | |||
| 317 | if( count($candidates) === 0 ) |
||
| 318 | {
|
||
| 319 | throw new UnexpectedValueException(); |
||
| 320 | } |
||
| 321 | |||
| 322 | return reset($candidates); |
||
| 323 | } |
||
| 324 | |||
| 325 | private function parsePrivileges($string) |
||
| 326 | {
|
||
| 327 | if( !preg_match('/GRANT\s+(?<privileges>.+)\s+ON/i', $string, $matches) )
|
||
| 328 | return array(); |
||
| 329 | |||
| 330 | $privilegeList = array_map(function ($privilege) |
||
| 331 | {
|
||
| 332 | return strtolower(trim($privilege)); |
||
| 333 | }, explode(',', $matches['privileges']));
|
||
| 334 | |||
| 335 | return is_array($privilegeList) ? $privilegeList : array(); |
||
| 336 | } |
||
| 337 | |||
| 338 | /** |
||
| 339 | * Проверяет наличие привилегии в SQL GRANT команде. |
||
| 340 | * |
||
| 341 | * @param string $string Строка, содержащая SQL GRANT команду. |
||
| 342 | * @param string $checkPrivilege Название привилегии на которую делается проверка. |
||
| 343 | * |
||
| 344 | * @return bool true в случае наличия привилегии, иначе false. |
||
| 345 | */ |
||
| 346 | private function checkPrivilege($string, $checkPrivilege) |
||
| 347 | {
|
||
| 348 | $privileges = $this->parsePrivileges($string); |
||
| 349 | |||
| 350 | return in_array(strtolower($checkPrivilege), $privileges) || in_array('all privileges', $privileges) || in_array('all', $privileges);
|
||
| 351 | } |
||
| 352 | } |
It seems like the type of the argument is not accepted by the function/method which you are calling.
In some cases, in particular if PHP’s automatic type-juggling kicks in this might be fine. In other cases, however this might be a bug.
We suggest to add an explicit type cast like in the following example: