2019-08-04 16:37:36 +02:00
|
|
|
<?php
|
|
|
|
namespace Psalm\Tests;
|
|
|
|
|
|
|
|
use Psalm\Config;
|
|
|
|
use Psalm\Context;
|
|
|
|
|
|
|
|
class TaintTest extends TestCase
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
2020-05-22 04:47:58 +02:00
|
|
|
public function testTaintedInputFromReturnTypeSimple()
|
2019-08-04 16:37:36 +02:00
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->getUserId();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2020-05-23 05:53:37 +02:00
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromReturnToInclude()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
$a = (string) $_GET["file"];
|
|
|
|
$b = "hello" . $a;
|
|
|
|
include str_replace("a", "b", $b);'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2020-05-23 06:03:29 +02:00
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromReturnToEval()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
2020-05-23 07:11:16 +02:00
|
|
|
$a = $_GET["file"];
|
|
|
|
eval("<?php" . $a);'
|
2020-05-23 06:03:29 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2019-08-05 16:21:23 +02:00
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromReturnTypeToEcho()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->getUserId();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
echo $userId;
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2019-08-04 16:37:36 +02:00
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputDirectly()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
|
|
$userId = (string) $_GET["user_id"];
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputDirectlySuppressed()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
2020-05-22 04:47:58 +02:00
|
|
|
/** @psalm-taint-remove sql */
|
2019-08-04 16:37:36 +02:00
|
|
|
$userId = (string) $_GET["user_id"];
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputDirectlySuppressedWithOtherUse()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function deleteUser(PDOWrapper $pdo) : void {
|
2020-05-22 04:47:58 +02:00
|
|
|
/**
|
|
|
|
* @psalm-taint-remove sql
|
|
|
|
*/
|
2019-08-04 16:37:36 +02:00
|
|
|
$userId = (string) $_GET["user_id"];
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUserSafer(PDOWrapper $pdo) : void {
|
|
|
|
$userId = $this->getSafeId();
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getSafeId() : string {
|
|
|
|
return "5";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class PDOWrapper {
|
|
|
|
/**
|
2020-05-22 04:47:58 +02:00
|
|
|
* @psalm-taint-sink sql $sql
|
2019-08-04 16:37:36 +02:00
|
|
|
*/
|
|
|
|
public function exec(string $sql) : void {}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromReturnTypeWithBranch()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
$userId = $this->getUserId();
|
|
|
|
|
|
|
|
if (rand(0, 1)) {
|
|
|
|
$userId .= "aaa";
|
|
|
|
} else {
|
|
|
|
$userId .= "bb";
|
|
|
|
}
|
|
|
|
|
|
|
|
return $userId;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testSinkAnnotation()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->getUserId();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDOWrapper $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class PDOWrapper {
|
|
|
|
/**
|
2020-05-22 04:47:58 +02:00
|
|
|
* @psalm-taint-sink sql $sql
|
2019-08-04 16:37:36 +02:00
|
|
|
*/
|
|
|
|
public function exec(string $sql) : void {}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromParam()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
2020-05-24 03:38:09 +02:00
|
|
|
$this->expectExceptionMessage('TaintedInput - somefile.php:17:36 - Detected tainted sql in path: $_GET (somefile.php:4:41) -> A::getUserId (somefile.php:8:41) -> concat (somefile.php:8:32) -> A::getAppendedUserId (somefile.php:12:35) -> $userId (somefile.php:12:25) -> A::deleteUser#2 (somefile.php:13:49) -> concat (somefile.php:17:36) -> PDO::exec#1 (somefile.php:17:36)');
|
2019-08-04 16:37:36 +02:00
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->getUserId();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$this->deleteUser($pdo, $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputToParam()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId(PDO $pdo) : void {
|
|
|
|
$this->deleteUser(
|
|
|
|
$pdo,
|
|
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
|
|
return "aaa" . $user_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputToParamAfterAssignment()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId(PDO $pdo) : void {
|
|
|
|
$this->deleteUser(
|
|
|
|
$pdo,
|
|
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
|
|
return "aaa" . $user_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
|
|
$userId2 = $userId;
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputToParamButSafe()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId(PDO $pdo) : void {
|
|
|
|
$this->deleteUser(
|
|
|
|
$pdo,
|
|
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
|
|
return "aaa" . $user_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
|
|
$userId2 = strlen($userId);
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputToParamAlternatePath()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
2020-05-24 03:38:09 +02:00
|
|
|
$this->expectExceptionMessage('TaintedInput - somefile.php:23:40 - Detected tainted sql in path: $_GET (somefile.php:7:63) -> A::getAppendedUserId#1 (somefile.php:7:54) -> concat (somefile.php:12:32) -> A::getAppendedUserId (somefile.php:11:37) -> A::deleteUser#3 (somefile.php:7:29) -> concat (somefile.php:23:40) -> PDO::exec#1 (somefile.php:23:40)');
|
2019-08-04 16:37:36 +02:00
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId(PDO $pdo) : void {
|
|
|
|
$this->deleteUser(
|
|
|
|
$pdo,
|
|
|
|
self::doFoo(),
|
|
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
|
|
return "aaa" . $user_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
public static function doFoo() : string {
|
|
|
|
return "hello";
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId, string $userId2) : void {
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
|
|
|
|
if (rand(0, 1)) {
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInParentLoader()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
2020-05-24 05:54:16 +02:00
|
|
|
$this->expectExceptionMessage('TaintedInput - somefile.php:16:40 - Detected tainted sql in path: $_GET (somefile.php:28:39) -> C::foo#1 (somefile.php:28:30) -> AGrandChild::loadFull#1 (somefile.php:24:47) -> A::loadFull#1 (somefile.php:24:47) -> A::loadPartial#1 (somefile.php:6:45) -> AChild::loadPartial#1 (somefile.php:6:45) -> concat (somefile.php:16:40) -> PDO::exec#1 (somefile.php:16:40)');
|
2019-08-04 16:37:36 +02:00
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
abstract class A {
|
|
|
|
abstract public static function loadPartial(string $sink) : void;
|
|
|
|
|
|
|
|
public static function loadFull(string $sink) : void {
|
|
|
|
static::loadPartial($sink);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function getPdo() : PDO {
|
|
|
|
return new PDO("connectionstring");
|
|
|
|
}
|
|
|
|
|
|
|
|
class AChild extends A {
|
|
|
|
public static function loadPartial(string $sink) : void {
|
|
|
|
getPdo()->exec("select * from foo where bar = " . $sink);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class AGrandChild extends AChild {}
|
|
|
|
|
|
|
|
class C {
|
|
|
|
public function foo(string $user_id) : void {
|
|
|
|
AGrandChild::loadFull($user_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
(new C)->foo((string) $_GET["user_id"]);'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testValidatedInputFromParam()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
/**
|
|
|
|
* @psalm-assert-untainted $userId
|
|
|
|
*/
|
|
|
|
function validateUserId(string $userId) : void {
|
|
|
|
if (!is_numeric($userId)) {
|
|
|
|
throw new \Exception("bad");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class A {
|
|
|
|
public function getUserId() : string {
|
|
|
|
return (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
|
|
$userId = $this->getUserId();
|
|
|
|
validateUserId($userId);
|
|
|
|
$this->deleteUser($pdo, $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testUntaintedInput()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public function getUserId() : int {
|
|
|
|
return (int) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->getUserId();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromProperty()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public string $userId;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->userId = (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->userId;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$this->deleteUser($pdo, $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
2020-05-22 18:33:04 +02:00
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testSpecializedCoreFunctionCall()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
$a = (string) $_GET["user_id"];
|
|
|
|
|
|
|
|
echo print_r([], true);
|
|
|
|
|
|
|
|
$b = print_r($a, true);'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputFromPropertyViaMixin()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class A {
|
|
|
|
public string $userId;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->userId = (string) $_GET["user_id"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @mixin A */
|
|
|
|
class B {
|
|
|
|
private A $a;
|
|
|
|
|
|
|
|
public function __construct(A $a) {
|
|
|
|
$this->a = $a;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function __get(string $name) {
|
|
|
|
return $this->a->$name;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class C {
|
|
|
|
private B $b;
|
|
|
|
|
|
|
|
public function __construct(B $b) {
|
|
|
|
$this->b = $b;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getAppendedUserId() : string {
|
|
|
|
return "aaaa" . $this->b->userId;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
|
|
$userId = $this->getAppendedUserId();
|
|
|
|
$this->deleteUser($pdo, $userId);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
2019-08-04 16:37:36 +02:00
|
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-06 00:33:33 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputViaStaticFunction()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class Utils {
|
|
|
|
public static function shorten(string $str) : string {
|
|
|
|
return $str;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class A {
|
|
|
|
public function foo() : void {
|
|
|
|
echo(Utils::shorten((string) $_GET["user_id"]));
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testTaintedInputViaPureStaticFunction()
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class Utils {
|
|
|
|
/**
|
|
|
|
* @psalm-pure
|
|
|
|
*/
|
|
|
|
public static function shorten(string $str) : string {
|
2020-05-22 04:47:58 +02:00
|
|
|
return substr($str, 0, 100);
|
2019-08-06 00:33:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class A {
|
|
|
|
public function foo() : void {
|
|
|
|
echo(Utils::shorten((string) $_GET["user_id"]));
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function testUntaintedInputViaStaticFunction()
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class Utils {
|
|
|
|
/**
|
|
|
|
* @psalm-pure
|
|
|
|
*/
|
|
|
|
public static function shorten(string $str) : string {
|
|
|
|
return $str;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class A {
|
|
|
|
public function foo() : void {
|
|
|
|
echo(htmlentities(Utils::shorten((string) $_GET["user_id"])));
|
|
|
|
}
|
|
|
|
|
|
|
|
public function bar() : void {
|
|
|
|
echo(Utils::shorten("hello"));
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-06 05:19:22 +02:00
|
|
|
|
|
|
|
public function testTaintedInputFromMagicProperty() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
2019-08-06 19:05:34 +02:00
|
|
|
/**
|
|
|
|
* @property string $userId
|
|
|
|
*/
|
2019-08-06 05:19:22 +02:00
|
|
|
class A {
|
|
|
|
/** @var array<string, string> */
|
|
|
|
private $vars = [];
|
|
|
|
|
|
|
|
public function __get(string $s) : string {
|
|
|
|
return $this->vars[$s];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function __set(string $s, string $t) {
|
|
|
|
$this->vars[$s] = $t;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function getAppendedUserId() : void {
|
|
|
|
$a = new A();
|
|
|
|
$a->userId = (string) $_GET["user_id"];
|
|
|
|
echo $a->userId;
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-06 16:33:21 +02:00
|
|
|
|
|
|
|
public function testTaintOverMixed() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
/**
|
|
|
|
* @psalm-suppress MixedAssignment
|
|
|
|
* @psalm-suppress MixedArgument
|
|
|
|
*/
|
|
|
|
function foo() : void {
|
|
|
|
$a = $_GET["bad"];
|
|
|
|
echo $a;
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-13 05:16:05 +02:00
|
|
|
|
|
|
|
public function testTaintStrConversion() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
function foo() : void {
|
|
|
|
$a = strtoupper(strtolower((string) $_GET["bad"]));
|
|
|
|
echo $a;
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testTaintHtmlEntities() : void
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
function foo() : void {
|
|
|
|
$a = htmlentities((string) $_GET["bad"]);
|
|
|
|
echo $a;
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-14 01:18:50 +02:00
|
|
|
|
|
|
|
public function testTaintIntoExec() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
function foo() : void {
|
|
|
|
$a = (string) $_GET["bad"];
|
|
|
|
exec($a);
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-10-12 05:28:17 +02:00
|
|
|
|
|
|
|
public function testTaintIntoExecMultipleConcat() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
function foo() : void {
|
|
|
|
$a = "9" . "a" . "b" . "c" . ((string) $_GET["bad"]) . "d" . "e" . "f";
|
|
|
|
exec($a);
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testTaintIntoNestedArrayUnnestedSeparately() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
function foo() : void {
|
|
|
|
$a = [[(string) $_GET["bad"]]];
|
|
|
|
exec($a[0][0]);
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testTaintIntoArrayAndThenOutAgain() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class C {
|
|
|
|
public static function foo() : array {
|
|
|
|
$a = (string) $_GET["bad"];
|
|
|
|
return [$a];
|
|
|
|
}
|
|
|
|
|
|
|
|
public static function bar() {
|
|
|
|
exec(self::foo()[0]);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-10-12 18:23:40 +02:00
|
|
|
|
|
|
|
public function testTaintAppendedToArray() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class C {
|
|
|
|
public static function foo() : array {
|
|
|
|
$a = [];
|
|
|
|
$a[] = (string) $_GET["bad"];
|
|
|
|
return $a;
|
|
|
|
}
|
|
|
|
|
|
|
|
public static function bar() {
|
|
|
|
exec(self::foo()[0]);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-10-14 23:10:30 +02:00
|
|
|
|
|
|
|
public function testTaintOnSubstrCall() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class U {
|
|
|
|
/** @psalm-pure */
|
|
|
|
public static function shorten(string $s) : string {
|
|
|
|
return substr($s, 0, 15);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V {}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->s = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 extends V {
|
|
|
|
public function foo(O1 $o) : void {
|
|
|
|
echo U::shorten($o->s);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2020-05-22 04:47:58 +02:00
|
|
|
public function testTaintOnStrReplaceCallSimple() : void
|
2019-10-14 23:10:30 +02:00
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class U {
|
|
|
|
/** @psalm-pure */
|
|
|
|
public static function shorten(string $s) : string {
|
|
|
|
return str_replace("foo", "bar", $s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V {}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->s = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 extends V {
|
|
|
|
public function foo(O1 $o) : void {
|
|
|
|
echo U::shorten($o->s);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2020-05-22 04:47:58 +02:00
|
|
|
public function testTaintOnStrReplaceCallRemovedInFunction() : void
|
2019-10-15 22:25:27 +02:00
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class U {
|
|
|
|
/**
|
|
|
|
* @psalm-pure
|
2020-05-22 04:47:58 +02:00
|
|
|
* @psalm-taint-remove html
|
2019-10-15 22:25:27 +02:00
|
|
|
*/
|
|
|
|
public static function shorten(string $s) : string {
|
|
|
|
return str_replace("foo", "bar", $s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V {}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->s = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 extends V {
|
|
|
|
public function foo(O1 $o) : void {
|
|
|
|
echo U::shorten($o->s);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testTaintOnStrReplaceCallRemovedInline() : void
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class V {}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->s = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 extends V {
|
|
|
|
public function foo(O1 $o) : void {
|
|
|
|
/**
|
2020-05-22 04:47:58 +02:00
|
|
|
* @psalm-taint-remove html
|
2019-10-15 22:25:27 +02:00
|
|
|
*/
|
|
|
|
$a = str_replace("foo", "bar", $o->s);
|
|
|
|
echo $a;
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
2019-10-14 23:10:30 +02:00
|
|
|
public function testTaintOnPregReplaceCall() : void
|
|
|
|
{
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
|
|
$this->expectExceptionMessage('TaintedInput');
|
|
|
|
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class U {
|
|
|
|
/** @psalm-pure */
|
|
|
|
public static function shorten(string $s) : string {
|
|
|
|
return preg_replace("/foo/", "bar", $s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V {}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->s = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 extends V {
|
|
|
|
public function foo(O1 $o) : void {
|
|
|
|
echo U::shorten($o->s);
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testNoTaintsOnSimilarPureCall() : void
|
|
|
|
{
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
|
|
|
|
$this->addFile(
|
|
|
|
'somefile.php',
|
|
|
|
'<?php
|
|
|
|
class U {
|
|
|
|
/** @psalm-pure */
|
|
|
|
public static function shorten(string $s) : string {
|
|
|
|
return substr($s, 0, 15);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @psalm-pure */
|
|
|
|
public static function escape(string $s) : string {
|
|
|
|
return htmlentities($s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class O1 {
|
|
|
|
public string $s;
|
|
|
|
|
|
|
|
public function __construct(string $s) {
|
|
|
|
$this->s = $s;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class O2 {
|
|
|
|
public string $t;
|
|
|
|
|
|
|
|
public function __construct() {
|
|
|
|
$this->t = (string) $_GET["FOO"];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V1 {
|
|
|
|
public function foo() : void {
|
|
|
|
$o = new O1((string) $_GET["FOO"]);
|
|
|
|
echo U::escape(U::shorten($o->s));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class V2 {
|
|
|
|
public function foo(O2 $o) : void {
|
|
|
|
echo U::shorten(U::escape($o->t));
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->analyzeFile('somefile.php', new Context());
|
|
|
|
}
|
2019-08-04 16:37:36 +02:00
|
|
|
}
|