1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
namespace Signify\SecurityChecker; |
4
|
|
|
|
5
|
|
|
use Composer\Semver\Semver; |
6
|
|
|
use FilesystemIterator; |
7
|
|
|
use GuzzleHttp\Client as GuzzleClient; |
8
|
|
|
use InvalidArgumentException; |
9
|
|
|
use LogicException; |
10
|
|
|
use RecursiveDirectoryIterator; |
11
|
|
|
use RecursiveIteratorIterator; |
12
|
|
|
use RecursiveRegexIterator; |
13
|
|
|
use RegexIterator; |
14
|
|
|
use Symfony\Component\Yaml\Yaml; |
15
|
|
|
use ZipArchive; |
16
|
|
|
|
17
|
|
|
class SecurityChecker |
18
|
|
|
{ |
19
|
|
|
public const ADVISORIES_URL = 'https://codeload.github.com/FriendsOfPHP/security-advisories/zip/master'; |
20
|
|
|
// Don't allow execution, since we're grabbing files from a source we don't control. |
21
|
|
|
public const FILE_PERMISSIONS = 0666; |
22
|
|
|
|
23
|
|
|
private $advisories; |
24
|
|
|
private $options; |
25
|
|
|
|
26
|
|
|
/** |
27
|
|
|
* @param array $options The options for this checker. |
28
|
|
|
* @throws InvalidArgumentException if the advisories directory isn't writable. |
29
|
|
|
* @throws LogicException if the request for the advisories package returns a response code >= 300 |
30
|
|
|
*/ |
31
|
|
|
public function __construct(array $options = []) |
32
|
|
|
{ |
33
|
|
|
// Set options. |
34
|
|
|
$this->options = array_merge( |
35
|
|
|
[ |
36
|
|
|
'advisories-dir' => sys_get_temp_dir() . '/signify-nz-security/advisories', |
37
|
|
|
'advisories-stale-after' => 86400, // 24 hrs in seconds. |
38
|
|
|
'guzzle-options' => [], |
39
|
|
|
], |
40
|
|
|
$options |
41
|
|
|
); |
42
|
|
|
|
43
|
|
|
$this->validateOptions(); |
44
|
|
|
|
45
|
|
|
// Get the advisories. |
46
|
|
|
$this->fetchAdvisories(); |
47
|
|
|
$this->instantiateAdvisories(); |
48
|
|
|
} |
49
|
|
|
|
50
|
|
|
/** |
51
|
|
|
* Checks a composer.lock file for vulnerable dependencies. |
52
|
|
|
* |
53
|
|
|
* @param string|array $lock The absolute path to the composer.lock file, or the json_decoded array. |
54
|
|
|
* @param boolean $includeDev If false, the dev dependencies won't be checked. |
55
|
|
|
* @return array |
56
|
|
|
* @throws InvalidArgumentException When the lock file does not exist or contains data in the wrong format. |
57
|
|
|
*/ |
58
|
|
|
public function check($lock, bool $includeDev = true): array |
59
|
|
|
{ |
60
|
|
|
if (is_string($lock)) { |
61
|
|
|
if (!is_file($lock)) { |
62
|
|
|
throw new InvalidArgumentException('Lock file does not exist.'); |
63
|
|
|
} |
64
|
|
|
$lockContents = json_decode(file_get_contents($lock), true); |
65
|
|
|
if (!is_array($lockContents)) { |
66
|
|
|
throw new InvalidArgumentException('Lock file does not contain correct format.'); |
67
|
|
|
} |
68
|
|
|
} elseif (is_array($lock)) { |
|
|
|
|
69
|
|
|
$lockContents = $lock; |
70
|
|
|
} else { |
71
|
|
|
throw new InvalidArgumentException( |
72
|
|
|
'$lock must be the absolute path to the composer.lock file, ' |
73
|
|
|
. 'or the json_decoded associative array of the composer.lock contents.' |
74
|
|
|
); |
75
|
|
|
} |
76
|
|
|
return $this->checkFromJson($lockContents, $includeDev); |
77
|
|
|
} |
78
|
|
|
|
79
|
|
|
/** |
80
|
|
|
* Checks JSON in the format of a composer.lock file for vulnerable dependencies. |
81
|
|
|
* |
82
|
|
|
* @param array $lock The json_decoded array in the format of a composer.lock file |
83
|
|
|
* @param boolean $includeDev If false, the dev dependencies won't be checked. |
84
|
|
|
* @return array |
85
|
|
|
* @throws InvalidArgumentException When the lock file does not exist |
86
|
|
|
*/ |
87
|
|
|
protected function checkFromJson(array $lock, bool $includeDev): array |
88
|
|
|
{ |
89
|
|
|
$vulnerabilities = []; |
90
|
|
|
$zeroUTC = strtotime('1970-01-01T00:00:00+00:00'); |
91
|
|
|
// Check all packages for vulnerabilities. |
92
|
|
|
foreach ($this->getPackages($lock, $includeDev) as $package) { |
93
|
|
|
$advisories = []; |
94
|
|
|
// Check for advisories about this specific package. |
95
|
|
|
if (array_key_exists($package['name'], $this->advisories)) { |
|
|
|
|
96
|
|
|
$normalisedVersion = $this->normalizeVersion($package['version']); |
97
|
|
|
foreach ($this->advisories[$package['name']] as $advisory) { |
98
|
|
|
// Check each branch of the advisory to see if the installed version is affected. |
99
|
|
|
foreach ($advisory['branches'] as $branchName => $branch) { |
100
|
|
|
if ($this->isDev($package['version'])) { |
101
|
|
|
// For dev packages, skip if not using the advisory branch. |
102
|
|
|
$branchName = StringUtil::removeFromEnd($branchName, '.x'); |
103
|
|
|
if ($branchName !== $normalisedVersion) { |
104
|
|
|
continue; |
105
|
|
|
} |
106
|
|
|
// For dev packages, skip if the advisory branch is older than the installed version. |
107
|
|
|
$packageTimestamp = strtotime($package['time'] . ' UTC'); |
108
|
|
|
if ($packageTimestamp === $zeroUTC || $packageTimestamp > $branch['time']) { |
109
|
|
|
continue; |
110
|
|
|
} |
111
|
|
|
} else { |
112
|
|
|
// For stable packages, skip if installed version doesn't satisfy the advisory constraints. |
113
|
|
|
if (!Semver::satisfies($package['version'], implode(',', $branch['versions']))) { |
114
|
|
|
continue; |
115
|
|
|
} |
116
|
|
|
} |
117
|
|
|
// If we got this far, the advisory applies for the installed package. |
118
|
|
|
// Unset the unnecessary information. |
119
|
|
|
unset($advisory['branches']); |
120
|
|
|
unset($advisory['reference']); |
121
|
|
|
$advisories[] = $advisory; |
122
|
|
|
// Break the branch loop - we've already confirmed this advisory. |
123
|
|
|
break; |
124
|
|
|
} |
125
|
|
|
} |
126
|
|
|
} |
127
|
|
|
// Add relevant advisories to the resultant vulnerabilities array. |
128
|
|
|
if (!empty($advisories)) { |
129
|
|
|
$vulnerabilities[$package['name']] = [ |
130
|
|
|
'version' => $package['version'], |
131
|
|
|
'advisories' => $advisories, |
132
|
|
|
]; |
133
|
|
|
} |
134
|
|
|
} |
135
|
|
|
return $vulnerabilities; |
136
|
|
|
} |
137
|
|
|
|
138
|
|
|
/** |
139
|
|
|
* Get the array of options for this checker. |
140
|
|
|
* |
141
|
|
|
* @return string[] |
142
|
|
|
*/ |
143
|
|
|
public function getOptions(): array |
144
|
|
|
{ |
145
|
|
|
return $this->options; |
146
|
|
|
} |
147
|
|
|
|
148
|
|
|
/** |
149
|
|
|
* Get an option for this checker. |
150
|
|
|
* |
151
|
|
|
* @param string $option The option to get. |
152
|
|
|
* @return mixed The option value, or null if it doesn't exist. |
153
|
|
|
*/ |
154
|
|
|
public function getOption(string $option) |
155
|
|
|
{ |
156
|
|
|
if (isset($this->options[$option])) { |
157
|
|
|
return $this->options[$option]; |
158
|
|
|
} |
159
|
|
|
return null; |
160
|
|
|
} |
161
|
|
|
|
162
|
|
|
/** |
163
|
|
|
* Get an array of packages which are included in the composer lock. |
164
|
|
|
* |
165
|
|
|
* @param array $lock Composer lock JSON as an associative array. |
166
|
|
|
* @return array |
167
|
|
|
*/ |
168
|
|
|
public function getPackages(array $lock, bool $includeDev = true): array |
169
|
|
|
{ |
170
|
|
|
$packages = []; |
171
|
|
|
$packageKeys = ['packages']; |
172
|
|
|
if ($includeDev) { |
173
|
|
|
$packageKeys[] = 'packages-dev'; |
174
|
|
|
} |
175
|
|
|
foreach ($packageKeys as $key) { |
176
|
|
|
if (!array_key_exists($key, $lock)) { |
177
|
|
|
continue; |
178
|
|
|
} |
179
|
|
|
$packages = array_merge($packages, $lock[$key]); |
180
|
|
|
} |
181
|
|
|
return $packages; |
182
|
|
|
} |
183
|
|
|
|
184
|
|
|
protected function validateOptions() |
185
|
|
|
{ |
186
|
|
|
// Confirm advisories directory can be written to (and create it if needs be) |
187
|
|
|
$advisoriesDir = $this->getOption('advisories-dir'); |
188
|
|
|
$old_umask = umask(0); |
189
|
|
|
if ((!is_dir($advisoriesDir) && !mkdir($advisoriesDir, 0777, true)) || !is_writable($advisoriesDir)) { |
|
|
|
|
190
|
|
|
umask($old_umask); |
191
|
|
|
throw new InvalidArgumentException("Directory '$advisoriesDir' must be writable."); |
192
|
|
|
} |
193
|
|
|
umask($old_umask); |
194
|
|
|
} |
195
|
|
|
|
196
|
|
|
/** |
197
|
|
|
* Normalise a dev package version to easily compare with advisory branches. |
198
|
|
|
* |
199
|
|
|
* @param string $version |
200
|
|
|
* @return string |
201
|
|
|
*/ |
202
|
|
|
protected function normalizeVersion(string $version): string |
203
|
|
|
{ |
204
|
|
|
$version = StringUtil::removeFromStart($version, 'dev-'); |
205
|
|
|
$version = StringUtil::removeFromEnd($version, ['.x-dev', '-dev']); |
206
|
|
|
return $version; |
207
|
|
|
} |
208
|
|
|
|
209
|
|
|
/** |
210
|
|
|
* Check if the package version is for a dev package. |
211
|
|
|
* |
212
|
|
|
* @param string $version |
213
|
|
|
* @return boolean |
214
|
|
|
*/ |
215
|
|
|
protected function isDev(string $version): bool |
216
|
|
|
{ |
217
|
|
|
$version = preg_replace('/"#.+$/', '', $version); |
218
|
|
|
if (StringUtil::startsWith($version, 'dev-') || StringUtil::endsWith($version, '-dev')) { |
219
|
|
|
return true; |
220
|
|
|
} |
221
|
|
|
|
222
|
|
|
return false; |
223
|
|
|
} |
224
|
|
|
|
225
|
|
|
/** |
226
|
|
|
* Fetch advisories from FriendsOfPHP. |
227
|
|
|
* |
228
|
|
|
* @return void |
229
|
|
|
*/ |
230
|
|
|
protected function fetchAdvisories(): void |
231
|
|
|
{ |
232
|
|
|
$advisoriesDir = $this->getOption('advisories-dir'); |
233
|
|
|
$timestampFile = $advisoriesDir . '/timestamp.txt'; |
234
|
|
|
// Don't fetch if we still have advisories and they aren't stale. |
235
|
|
|
if (is_file($timestampFile) && !$this->isStale(file_get_contents($timestampFile))) { |
236
|
|
|
return; |
237
|
|
|
} |
238
|
|
|
|
239
|
|
|
// Fetch advisories zip from github. |
240
|
|
|
$client = new GuzzleClient(); |
241
|
|
|
$response = $client->request('GET', self::ADVISORIES_URL, $this->getOption('guzzle-options')); |
|
|
|
|
242
|
|
|
if ($response->getStatusCode() >= 300) { |
243
|
|
|
throw new LogicException('Got status code ' . $response->getStatusCode() . ' when requesting advisories.'); |
244
|
|
|
} |
245
|
|
|
|
246
|
|
|
// Store zip temporarily so it can be unzipped. |
247
|
|
|
$file = tempnam(sys_get_temp_dir(), 'zip'); |
248
|
|
|
file_put_contents($file, $response->getBody()); |
249
|
|
|
|
250
|
|
|
// Unzip advisories repository. |
251
|
|
|
$zip = new ZipArchive(); |
252
|
|
|
$zip->open($file); |
253
|
|
|
$zip->extractTo($advisoriesDir); |
254
|
|
|
$zip->close(); |
255
|
|
|
|
256
|
|
|
// Remove temporary zip file |
257
|
|
|
unlink($file); |
258
|
|
|
|
259
|
|
|
// Add timestamp to the directory so we don't refetch unnecessarily. |
260
|
|
|
file_put_contents($timestampFile, time()); |
261
|
|
|
|
262
|
|
|
// Ensure all files have correct permissions. |
263
|
|
|
$this->setFilePermissionsRecursive($advisoriesDir); |
|
|
|
|
264
|
|
|
} |
265
|
|
|
|
266
|
|
|
/** |
267
|
|
|
* Recursively set permissions for all files nested inside some directory. |
268
|
|
|
* |
269
|
|
|
* @param string $dir |
270
|
|
|
* @return void |
271
|
|
|
* @throws InvalidArgumentException if $dir is not a directory. |
272
|
|
|
*/ |
273
|
|
|
private function setFilePermissionsRecursive(string $dir): void |
274
|
|
|
{ |
275
|
|
|
if (!is_dir($dir)) { |
276
|
|
|
throw new InvalidArgumentException("$dir must be a directory."); |
277
|
|
|
} |
278
|
|
|
$recursion = new RecursiveDirectoryIterator($dir, FilesystemIterator::SKIP_DOTS); |
279
|
|
|
foreach (new RecursiveIteratorIterator($recursion) as $item) { |
280
|
|
|
chmod($item->getPathname(), self::FILE_PERMISSIONS); |
281
|
|
|
} |
282
|
|
|
} |
283
|
|
|
|
284
|
|
|
/** |
285
|
|
|
* Check if a timestamp is outside the permitted timeframe. |
286
|
|
|
* |
287
|
|
|
* @param string|int $timestamp The unix timestamp to check for staleness. |
288
|
|
|
* @return boolean |
289
|
|
|
*/ |
290
|
|
|
protected function isStale($timestamp): bool |
291
|
|
|
{ |
292
|
|
|
return ((int)$timestamp) < (time() - $this->getOption('advisories-stale-after')); |
293
|
|
|
} |
294
|
|
|
|
295
|
|
|
/** |
296
|
|
|
* Read advisory yaml files from the FriendsOfPHP repo into memory. |
297
|
|
|
* |
298
|
|
|
* @return void |
299
|
|
|
*/ |
300
|
|
|
protected function instantiateAdvisories(): void |
301
|
|
|
{ |
302
|
|
|
if (!empty($this->advisories)) { |
303
|
|
|
return; |
304
|
|
|
} |
305
|
|
|
$this->advisories = []; |
306
|
|
|
|
307
|
|
|
// Parse all yaml files. |
308
|
|
|
$dir = $this->getOption('advisories-dir') . '/security-advisories-master/'; |
309
|
|
|
$recursiveIterator = new RecursiveIteratorIterator( |
310
|
|
|
new RecursiveDirectoryIterator($dir, FilesystemIterator::SKIP_DOTS) |
311
|
|
|
); |
312
|
|
|
// Match all files with a .yml or .yaml extension within our directory which are not in hidden directories. |
313
|
|
|
$regex = '/^' . preg_quote($dir, '/') . '[^.]+\.(yaml|yml)$/i'; |
314
|
|
|
foreach (new RegexIterator($recursiveIterator, $regex, RecursiveRegexIterator::GET_MATCH) as $match) { |
315
|
|
|
$filename = $match[0]; |
316
|
|
|
// Parse yaml and store advisory against package name. |
317
|
|
|
$advisory = Yaml::parseFile($filename); |
318
|
|
|
$packageName = preg_replace('/^composer:\/\//', '', $advisory['reference']); |
319
|
|
|
$this->advisories[$packageName][] = $advisory; |
320
|
|
|
} |
321
|
|
|
} |
322
|
|
|
} |
323
|
|
|
|