getTestName(); if (\strpos($test_name, 'SKIPPED-') !== false) { $this->markTestSkipped('Skipped due to a bug.'); } if (\strtoupper(\substr(\PHP_OS, 0, 3)) === 'WIN') { $this->markTestSkipped('Skip taint tests in Windows for now'); } $file_path = self::$src_dir_path . 'somefile.php'; $this->addFile( $file_path, $code ); $this->project_analyzer->trackTaintedInputs(); $this->analyzeFile($file_path, new Context(), false); } /** * @dataProvider providerInvalidCodeParse * * */ public function testInvalidCode(string $code, string $error_message): void { if (\strpos($this->getTestName(), 'SKIPPED-') !== false) { $this->markTestSkipped(); } if (\strtoupper(\substr(\PHP_OS, 0, 3)) === 'WIN') { $this->markTestSkipped('Skip taint tests in Windows for now'); } $this->expectException(\Psalm\Exception\CodeException::class); $this->expectExceptionMessageRegExp('/\b' . \preg_quote($error_message, '/') . '\b/'); $file_path = self::$src_dir_path . 'somefile.php'; $this->addFile( $file_path, $code ); $this->project_analyzer->trackTaintedInputs(); $this->analyzeFile($file_path, new Context(), false); } /** * @return array */ public function providerValidCodeParse(): array { return [ 'taintedInputInCreatedArrayNotEchoed' => [ ' $name, "id" => $id]; echo "

" . htmlentities($data["name"]) . "

"; echo "

" . $data["id"] . "

";' ], 'taintedInputInAssignedArrayNotEchoed' => [ '" . htmlentities($data["name"]) . ""; echo "

" . $data["id"] . "

";' ], 'taintedInputDirectlySuppressed' => [ 'exec("delete from users where user_id = " . $userId); } }' ], 'taintedInputDirectlySuppressedWithOtherUse' => [ 'exec("delete from users where user_id = " . $userId); } public function deleteUserSafer(PDOWrapper $pdo) : void { $userId = $this->getSafeId(); $pdo->exec("delete from users where user_id = " . $userId); } public function getSafeId() : string { return "5"; } } class PDOWrapper { /** * @psalm-taint-sink sql $sql */ public function exec(string $sql) : void {} }' ], 'taintedInputToParamButSafe' => [ 'deleteUser( $pdo, $this->getAppendedUserId((string) $_GET["user_id"]) ); } public function getAppendedUserId(string $user_id) : string { return "aaa" . $user_id; } public function deleteUser(PDO $pdo, string $userId) : void { $userId2 = strlen($userId); $pdo->exec("delete from users where user_id = " . $userId2); } }' ], 'ValidatedInputFromParam' => [ 'getUserId(); validateUserId($userId); $this->deleteUser($pdo, $userId); } public function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } }' ], 'untaintedInputAfterIntCast' => [ 'getUserId(); } public function deleteUser(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $pdo->exec("delete from users where user_id = " . $userId); } }' ], 'specializedCoreFunctionCall' => [ ' [ ' [ ' [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { echo U::shorten($o->s); } }' ], 'taintOnPregReplaceCallRemovedInFunction' => [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { echo U::shorten($o->s); } }' ], 'taintOnStrReplaceCallRemovedInline' => [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { /** * @psalm-taint-escape html */ $a = str_replace("foo", "bar", $o->s); echo $a; } }' ], 'NoTaintsOnSimilarPureCall' => [ 's = $s; } } class O2 { public string $t; public function __construct() { $this->t = (string) $_GET["FOO"]; } } class V1 { public function foo() : void { $o = new O1((string) $_GET["FOO"]); echo U::escape(U::shorten($o->s)); } } class V2 { public function foo(O2 $o) : void { echo U::shorten(U::escape($o->t)); } }' ], 'taintPropertyPassingObjectWithDifferentValue' => [ 'id = $userId; } } class UserUpdater { public static function doDelete(PDO $pdo, User $user) : void { self::deleteUser($pdo, $user->name); } public static function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } } $userObj = new User((string) $_GET["user_id"]); UserUpdater::doDelete(new PDO(), $userObj);' ], 'taintPropertyWithoutPassingObject' => [ 'id = $userId; } } class UserUpdater { public static function doDelete(PDO $pdo, User $user) : void { self::deleteUser($pdo, $user->id); } public static function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } } $userObj = new User((string) $_GET["user_id"]);', ], 'specializeStaticMethod' => [ ' [ ' $_GET["name"], "b" => "foo"]; foreach ($a as $m) { echo $m["b"]; }' ], 'taintFreeNestedArrayWithOffsetAccessedExplicitly' => [ ' $_GET["name"], "b" => "foo"]; echo $a[0]["b"];', ], 'intUntainted' => [ ' [ 'x = $x; } } $a = new StringHolder("a"); $b = new StringHolder($_GET["x"]); echo $a->x;' ], 'suppressTaintedInput' => [ ' [ ' */ public function providerInvalidCodeParse(): array { return [ 'taintedInputFromMethodReturnTypeSimple' => [ 'getUserId(); } public function deleteUser(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'taintedInputFromFunctionReturnType' => [ ' 'TaintedInput - src' . DIRECTORY_SEPARATOR . 'somefile.php:6:26 - Detected tainted html in path: $_GET -> $_GET[\'name\'] (src/somefile.php:3:32) -> coalesce (src/somefile.php:3:32) -> getName (src/somefile.php:2:42) -> call to echo (src/somefile.php:6:26) -> echo#1', ], 'taintedInputFromExplicitTaintSource' => [ ' 'TaintedInput', ], 'taintedInputFromExplicitTaintSourceStaticMethod' => [ ' 'TaintedInput', ], 'taintedInputFromGetArray' => [ ' 'TaintedInput', ], 'taintedInputFromReturnToInclude' => [ ' 'TaintedInput', ], 'taintedInputFromReturnToEval' => [ ' 'TaintedInput', ], 'taintedInputFromReturnTypeToEcho' => [ 'getUserId(); } public function deleteUser(PDO $pdo) : void { $userId = $this->getAppendedUserId(); echo $userId; } }', 'error_message' => 'TaintedInput', ], 'taintedInputInCreatedArrayIsEchoed' => [ ' $name]; echo "

" . $data["name"] . "

";', 'error_message' => 'TaintedInput', ], 'testTaintedInputInAssignedArrayIsEchoed' => [ '" . $data["name"] . "";', 'error_message' => 'TaintedInput', ], 'taintedInputDirectly' => [ 'exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'taintedInputFromReturnTypeWithBranch' => [ 'getUserId(); if (rand(0, 1)) { $userId .= "aaa"; } else { $userId .= "bb"; } return $userId; } public function deleteUser(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'sinkAnnotation' => [ 'getUserId(); } public function deleteUser(PDOWrapper $pdo) : void { $userId = $this->getAppendedUserId(); $pdo->exec("delete from users where user_id = " . $userId); } } class PDOWrapper { /** * @psalm-taint-sink sql $sql */ public function exec(string $sql) : void {} }', 'error_message' => 'TaintedInput', ], 'taintedInputFromParam' => [ 'getUserId(); } public function doDelete(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $this->deleteUser($pdo, $userId); } public function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput - src' . DIRECTORY_SEPARATOR . 'somefile.php:17:40 - Detected tainted sql in path: $_GET -> $_GET[\'user_id\'] (src/somefile.php:4:45) -> A::getUserId (src/somefile.php:3:55) -> concat (src/somefile.php:8:36) -> A::getAppendedUserId (src/somefile.php:7:63) -> $userId (src/somefile.php:12:29) -> call to A::deleteUser (src/somefile.php:13:53) -> A::deleteUser#2 (src/somefile.php:16:69) -> $userId (src/somefile.php:16:69) -> concat (src/somefile.php:17:40) -> call to PDO::exec (src/somefile.php:17:40) -> PDO::exec#1', ], 'taintedInputToParam' => [ 'deleteUser( $pdo, $this->getAppendedUserId((string) $_GET["user_id"]) ); } public function getAppendedUserId(string $user_id) : string { return "aaa" . $user_id; } public function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'taintedInputToParamAfterAssignment' => [ 'deleteUser( $pdo, $this->getAppendedUserId((string) $_GET["user_id"]) ); } public function getAppendedUserId(string $user_id) : string { return "aaa" . $user_id; } public function deleteUser(PDO $pdo, string $userId) : void { $userId2 = $userId; $pdo->exec("delete from users where user_id = " . $userId2); } }', 'error_message' => 'TaintedInput', ], 'taintedInputToParamAlternatePath' => [ 'deleteUser( $pdo, self::doFoo(), $this->getAppendedUserId((string) $_GET["user_id"]) ); } public function getAppendedUserId(string $user_id) : string { return "aaa" . $user_id; } public static function doFoo() : string { return "hello"; } public function deleteUser(PDO $pdo, string $userId, string $userId2) : void { $pdo->exec("delete from users where user_id = " . $userId); if (rand(0, 1)) { $pdo->exec("delete from users where user_id = " . $userId2); } } }', 'error_message' => 'TaintedInput - src' . DIRECTORY_SEPARATOR . 'somefile.php:23:44 - Detected tainted sql in path: $_GET -> $_GET[\'user_id\'] (src/somefile.php:7:67) -> call to A::getAppendedUserId (src/somefile.php:7:58) -> A::getAppendedUserId#1 (src/somefile.php:11:66) -> $user_id (src/somefile.php:11:66) -> concat (src/somefile.php:12:36) -> A::getAppendedUserId (src/somefile.php:11:78) -> call to A::deleteUser (src/somefile.php:7:33) -> A::deleteUser#3 (src/somefile.php:19:85) -> $userId2 (src/somefile.php:19:85) -> concat (src/somefile.php:23:44) -> call to PDO::exec (src/somefile.php:23:44) -> PDO::exec#1', ], 'taintedInParentLoader' => [ 'exec("select * from foo where bar = " . $sink); } } class AGrandChild extends AChild {} class C { public function foo(string $user_id) : void { AGrandChild::loadFull($user_id); } } (new C)->foo((string) $_GET["user_id"]);', 'error_message' => 'TaintedInput - src' . DIRECTORY_SEPARATOR . 'somefile.php:16:44 - Detected tainted sql in path: $_GET -> $_GET[\'user_id\'] (src/somefile.php:28:43) -> call to C::foo (src/somefile.php:28:34) -> C::foo#1 (src/somefile.php:23:52) -> $user_id (src/somefile.php:23:52) -> call to AGrandChild::loadFull (src/somefile.php:24:51) -> AGrandChild::loadFull#1 (src/somefile.php:5:64) -> A::loadFull#1 (src/somefile.php:24:51) -> $sink (src/somefile.php:5:64) -> call to A::loadPartial (src/somefile.php:6:49) -> A::loadPartial#1 (src/somefile.php:3:76) -> AChild::loadPartial#1 (src/somefile.php:6:49) -> $sink (src/somefile.php:15:67) -> concat (src/somefile.php:16:44) -> call to PDO::exec (src/somefile.php:16:44) -> PDO::exec#1', ], 'taintedInputFromProperty' => [ 'userId = (string) $_GET["user_id"]; } public function getAppendedUserId() : string { return "aaaa" . $this->userId; } public function doDelete(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $this->deleteUser($pdo, $userId); } public function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'taintedInputFromPropertyViaMixin' => [ 'userId = (string) $_GET["user_id"]; } } /** @mixin A */ class B { private A $a; public function __construct(A $a) { $this->a = $a; } public function __get(string $name) { return $this->a->$name; } } class C { private B $b; public function __construct(B $b) { $this->b = $b; } public function getAppendedUserId() : string { return "aaaa" . $this->b->userId; } public function doDelete(PDO $pdo) : void { $userId = $this->getAppendedUserId(); $this->deleteUser($pdo, $userId); } public function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } }', 'error_message' => 'TaintedInput', ], 'taintedInputViaStaticFunction' => [ ' 'TaintedInput', ], 'taintedInputViaPureStaticFunction' => [ ' 'TaintedInput', ], 'untaintedInputViaStaticFunctionWithoutSafePath' => [ ' 'TaintedInput', ], 'taintedInputFromMagicProperty' => [ ' */ private $vars = []; public function __get(string $s) : string { return $this->vars[$s]; } public function __set(string $s, string $t) { $this->vars[$s] = $t; } } function getAppendedUserId() : void { $a = new A(); $a->userId = (string) $_GET["user_id"]; echo $a->userId; }', 'error_message' => 'TaintedInput', ], 'taintOverMixed' => [ ' 'TaintedInput', ], 'taintStrConversion' => [ ' 'TaintedInput', ], 'taintIntoExec' => [ ' 'TaintedInput', ], 'taintIntoExecMultipleConcat' => [ ' 'TaintedInput', ], 'taintIntoNestedArrayUnnestedSeparately' => [ ' 'TaintedInput', ], 'taintIntoArrayAndThenOutAgain' => [ ' 'TaintedInput', ], 'taintAppendedToArray' => [ ' 'TaintedInput', ], 'taintOnSubstrCall' => [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { echo U::shorten($o->s); } }', 'error_message' => 'TaintedInput', ], 'taintOnStrReplaceCallSimple' => [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { echo U::shorten($o->s); } }', 'error_message' => 'TaintedInput', ], 'taintOnPregReplaceCall' => [ 's = (string) $_GET["FOO"]; } } class V1 extends V { public function foo(O1 $o) : void { echo U::shorten($o->s); } }', 'error_message' => 'TaintedInput', ], 'IndirectGetAssignment' => [ 'name = $name; } /** * @psalm-specialize-call */ public function getArg(string $method, string $type) { $arg = null; switch ($method) { case "post": if (isset($_POST[$this->name])) { $arg = $_POST[$this->name]; } break; case "get": if (isset($_GET[$this->name])) { $arg = $_GET[$this->name]; } break; } return $this->filterInput($type, $arg); } protected function filterInput(string $type, $arg) { // input is null if ($arg === null) { return null; } // set to null if sanitize clears arg if ($arg === "") { $arg = null; } // type casting if ($arg !== null) { $arg = $this->typeCastInput($type, $arg); } return $arg; } protected function typeCastInput(string $type, $arg) { if ($type === "string") { return (string) $arg; } return null; } } echo (new InputFilter("hello"))->getArg("get", "string");', 'error_message' => 'TaintedInput', ], 'taintPropertyPassingObject' => [ 'id = $userId; } } class UserUpdater { public static function doDelete(PDO $pdo, User $user) : void { self::deleteUser($pdo, $user->id); } public static function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } } $userObj = new User((string) $_GET["user_id"]); UserUpdater::doDelete(new PDO(), $userObj);', 'error_message' => 'TaintedInput', ], 'taintPropertyPassingObjectSettingValueLater' => [ 'id = $userId; } public function setId(string $userId) : void { $this->id = $userId; } } class UserUpdater { public static function doDelete(PDO $pdo, User $user) : void { self::deleteUser($pdo, $user->id); } public static function deleteUser(PDO $pdo, string $userId) : void { $pdo->exec("delete from users where user_id = " . $userId); } } $userObj = new User("5"); $userObj->setId((string) $_GET["user_id"]); UserUpdater::doDelete(new PDO(), $userObj);', 'error_message' => 'TaintedInput', ], 'ImplodeExplode' => [ ' 'TaintedInput', ], 'ImplodeIndirect' => [ ' 'TaintedInput', ], 'taintThroughPregReplaceCallback' => [ ' 'TaintedInput', ], 'taintedFunctionWithNoTypes' => [ ' 'TaintedInput', ], 'taintedStaticCallWithNoTypes' => [ ' 'TaintedInput', ], 'taintedInstanceCallWithNoTypes' => [ 'rawinput();', 'error_message' => 'TaintedInput', ], 'taintStringObtainedUsingStrval' => [ ' 'TaintedInput', ], 'taintStringObtainedUsingSprintf' => [ ' 'TaintedInput', ], 'encapsulatedString' => [ ' 'TaintedInput', ], 'encapsulatedToStringMagic' => [ ' 'TaintedInput', ], 'castToStringMagic' => [ ' 'TaintedInput', ], 'castToStringViaArgument' => [ ' 'TaintedInput', ], 'toStringTaintInSubclass' => [ ' 'TaintedInput', ], 'implicitToStringMagic' => [ ' 'TaintedInput', ], 'namespacedFunction' => [ ' 'TaintedInput', ], 'print' => [ ' 'TaintedInput - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:27 - Detected tainted html in path: $_GET -> $_GET[\'name\'] (src/somefile.php:2:27) -> call to print (src/somefile.php:2:27) -> print#1', ], 'unpackArgs' => [ ' 'TaintedInput', ], 'foreachArg' => [ ' 'TaintedInput', ], 'magicPropertyType' => [ 'params[$a]; } public function __set(string $a, $value) { $this->params[$a] = $value; } } $m = new Magic(); $m->taint = $_GET["input"]; echo $m->taint;', 'error_message' => 'TaintedInput', ], 'taintNestedArrayWithOffsetAccessedInForeach' => [ ' $_GET["name"], "b" => "foo"]; foreach ($a as $m) { echo $m["a"]; }', 'error_message' => 'TaintedInput', ], 'taintNestedArrayWithOffsetAccessedExplicitly' => [ ' $_GET["name"], "b" => "foo"]; echo $a[0]["a"];', 'error_message' => 'TaintedInput', ], 'taintThroughArrayMapExplicitClosure' => [ ' 'TaintedInput', ], 'taintThroughArrayMapExplicitTypedClosure' => [ ' 'TaintedInput', ], 'taintThroughArrayMapExplicitArrowFunction' => [ ' trim($str), $_GET); echo $get["test"];', 'error_message' => 'TaintedInput', ], 'taintThroughArrayMapImplicitFunctionCall' => [ ' $_GET["name"]]; $get = array_map("trim", $a); echo $get["test"];', 'error_message' => 'TaintedInput', ], 'taintFilterVar' => [ ' "trim"]); echo $get["test"];', 'error_message' => 'TaintedInput', ], 'taintAfterReconciledType' => [ ' 'TaintedInput', ], 'taintExit' => [ ' 'TaintedInput', ], 'taintSpecializedMethod' => [ 'isUnsafe();', 'error_message' => 'TaintedInput', ], 'taintSpecializedInstanceProperty' => [ 'x = $x; } } $b = new StringHolder($_GET["x"]); echo $b->x;', 'error_message' => 'TaintedInput', ], 'taintUnserialize' => [ ' 'TaintedInput', ], 'taintCreateFunction' => [ ' 'TaintedInput', ], 'taintException' => [ ' 'TaintedInput', ], 'taintError' => [ 'getTraceAsString()}\n"; }', 'error_message' => 'TaintedInput', ], 'taintThrowable' => [ ' 'TaintedInput', ], /* // TODO: Stubs do not support this type of inference even with $this->message = $message. // Most uses of getMessage() would be with caught exceptions, so this is not representative of real code. 'taintException' => [ 'getMessage();', 'error_message' => 'TaintedInput', ], */ ]; } }