mirror of
https://github.com/danog/psalm.git
synced 2024-12-13 01:37:23 +01:00
9d9dba156c
enable test on taint
2287 lines
84 KiB
PHP
2287 lines
84 KiB
PHP
<?php
|
|
namespace Psalm\Tests;
|
|
|
|
use Psalm\Context;
|
|
use Psalm\Internal\Analyzer\IssueData;
|
|
use Psalm\IssueBuffer;
|
|
|
|
use function trim;
|
|
|
|
use const DIRECTORY_SEPARATOR;
|
|
|
|
class TaintTest extends TestCase
|
|
{
|
|
/**
|
|
* @dataProvider providerValidCodeParse
|
|
*/
|
|
public function testValidCode(string $code): void
|
|
{
|
|
$test_name = $this->getTestName();
|
|
if (\strpos($test_name, 'SKIPPED-') !== false) {
|
|
$this->markTestSkipped('Skipped due to a bug.');
|
|
}
|
|
|
|
$file_path = self::$src_dir_path . 'somefile.php';
|
|
|
|
$this->addFile(
|
|
$file_path,
|
|
$code
|
|
);
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
$this->project_analyzer->getCodebase()->config->initializePlugins($this->project_analyzer);
|
|
|
|
$this->analyzeFile($file_path, new Context(), false);
|
|
}
|
|
|
|
/**
|
|
* @dataProvider providerInvalidCodeParse
|
|
*/
|
|
public function testInvalidCode(string $code, string $error_message): void
|
|
{
|
|
if (\strpos($this->getTestName(), 'SKIPPED-') !== false) {
|
|
$this->markTestSkipped();
|
|
}
|
|
|
|
$this->expectException(\Psalm\Exception\CodeException::class);
|
|
$this->expectExceptionMessageRegExp('/\b' . \preg_quote($error_message, '/') . '\b/');
|
|
|
|
$file_path = self::$src_dir_path . 'somefile.php';
|
|
|
|
$this->addFile(
|
|
$file_path,
|
|
$code
|
|
);
|
|
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
$this->analyzeFile($file_path, new Context(), false);
|
|
}
|
|
|
|
/**
|
|
* @return array<string, array{string}>
|
|
*/
|
|
public function providerValidCodeParse(): array
|
|
{
|
|
return [
|
|
'taintedInputInCreatedArrayNotEchoed' => [
|
|
'<?php
|
|
$name = $_GET["name"] ?? "unknown";
|
|
$id = (int) $_GET["id"];
|
|
|
|
$data = ["name" => $name, "id" => $id];
|
|
|
|
echo "<h1>" . htmlentities($data["name"], \ENT_QUOTES) . "</h1>";
|
|
echo "<p>" . $data["id"] . "</p>";'
|
|
],
|
|
'taintedInputInAssignedArrayNotEchoed' => [
|
|
'<?php
|
|
$name = $_GET["name"] ?? "unknown";
|
|
$id = (int) $_GET["id"];
|
|
|
|
$data = [];
|
|
$data["name"] = $name;
|
|
$data["id"] = $id;
|
|
|
|
echo "<h1>" . htmlentities($data["name"], \ENT_QUOTES) . "</h1>";
|
|
echo "<p>" . $data["id"] . "</p>";'
|
|
],
|
|
'taintedInputDirectlySuppressed' => [
|
|
'<?php
|
|
class A {
|
|
public function deleteUser(PDO $pdo) : void {
|
|
/** @psalm-taint-escape sql */
|
|
$userId = (string) $_GET["user_id"];
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}'
|
|
],
|
|
'taintedInputDirectlySuppressedWithOtherUse' => [
|
|
'<?php
|
|
class A {
|
|
public function deleteUser(PDOWrapper $pdo) : void {
|
|
/**
|
|
* @psalm-taint-escape sql
|
|
*/
|
|
$userId = (string) $_GET["user_id"];
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
|
|
public function deleteUserSafer(PDOWrapper $pdo) : void {
|
|
$userId = $this->getSafeId();
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
|
|
public function getSafeId() : string {
|
|
return "5";
|
|
}
|
|
}
|
|
|
|
class PDOWrapper {
|
|
/**
|
|
* @psalm-taint-sink sql $sql
|
|
*/
|
|
public function exec(string $sql) : void {}
|
|
}'
|
|
],
|
|
'taintedInputToParamButSafe' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId(PDO $pdo) : void {
|
|
$this->deleteUser(
|
|
$pdo,
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
);
|
|
}
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
return "aaa" . $user_id;
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$userId2 = strlen($userId);
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
}
|
|
}'
|
|
],
|
|
'ValidatedInputFromParam' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-assert-untainted $userId
|
|
*/
|
|
function validateUserId(string $userId) : void {
|
|
if (!is_numeric($userId)) {
|
|
throw new \Exception("bad");
|
|
}
|
|
}
|
|
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
$userId = $this->getUserId();
|
|
validateUserId($userId);
|
|
$this->deleteUser($pdo, $userId);
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}'
|
|
],
|
|
'untaintedInputAfterIntCast' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : int {
|
|
return (int) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->getUserId();
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}'
|
|
],
|
|
'specializedCoreFunctionCall' => [
|
|
'<?php
|
|
$a = (string) ($data["user_id"] ?? "");
|
|
|
|
echo print_r([], true);
|
|
|
|
$b = print_r($a, true);'
|
|
],
|
|
'untaintedInputViaStaticFunctionWithSafePath' => [
|
|
'<?php
|
|
class Utils {
|
|
/**
|
|
* @psalm-pure
|
|
*/
|
|
public static function shorten(string $str) : string {
|
|
return $str;
|
|
}
|
|
}
|
|
|
|
class A {
|
|
public function foo() : void {
|
|
echo(htmlentities(Utils::shorten((string) $_GET["user_id"]), \ENT_QUOTES));
|
|
}
|
|
|
|
public function bar() : void {
|
|
echo(Utils::shorten("hello"));
|
|
}
|
|
}'
|
|
],
|
|
'taintHtmlEntities' => [
|
|
'<?php
|
|
function foo() : void {
|
|
$a = htmlentities((string) $_GET["bad"], \ENT_QUOTES);
|
|
echo $a;
|
|
}'
|
|
],
|
|
'taintFilterVarInt' => [
|
|
'<?php
|
|
echo filter_var($_GET["bad"], FILTER_VALIDATE_INT);'
|
|
],
|
|
'taintFilterVarBoolean' => [
|
|
'<?php
|
|
echo filter_var($_GET["bad"], FILTER_VALIDATE_BOOLEAN);'
|
|
],
|
|
'taintFilterVarFloat' => [
|
|
'<?php
|
|
echo filter_var($_GET["bad"], FILTER_VALIDATE_FLOAT);'
|
|
],
|
|
'taintLdapEscape' => [
|
|
'<?php
|
|
$ds = ldap_connect(\'example.com\');
|
|
$dn = \'o=Psalm, c=US\';
|
|
$filter = ldap_escape($_GET[\'filter\']);
|
|
ldap_search($ds, $dn, $filter, []);'
|
|
],
|
|
'taintOnStrReplaceCallRemovedInFunction' => [
|
|
'<?php
|
|
class U {
|
|
/**
|
|
* @psalm-pure
|
|
* @psalm-taint-escape html
|
|
* @psalm-taint-escape has_quotes
|
|
*/
|
|
public static function shorten(string $s) : string {
|
|
return str_replace("foo", "bar", $s);
|
|
}
|
|
}
|
|
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
echo U::shorten($o->s);
|
|
}
|
|
}'
|
|
],
|
|
'taintOnPregReplaceCallRemovedInFunction' => [
|
|
'<?php
|
|
class U {
|
|
/**
|
|
* @psalm-pure
|
|
*/
|
|
public static function shorten(string $s) : string {
|
|
return preg_replace("/[^_a-z\/\.A-Z0-9]/", "bar", $s);
|
|
}
|
|
}
|
|
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
echo U::shorten($o->s);
|
|
}
|
|
}'
|
|
],
|
|
'taintOnStrReplaceCallRemovedInline' => [
|
|
'<?php
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
/**
|
|
* @psalm-taint-escape html
|
|
* @psalm-taint-escape has_quotes
|
|
*/
|
|
$a = str_replace("foo", "bar", $o->s);
|
|
echo $a;
|
|
}
|
|
}'
|
|
],
|
|
'NoTaintsOnSimilarPureCall' => [
|
|
'<?php
|
|
class U {
|
|
/** @psalm-pure */
|
|
public static function shorten(string $s) : string {
|
|
return substr($s, 0, 15);
|
|
}
|
|
|
|
/** @psalm-pure */
|
|
public static function escape(string $s) : string {
|
|
return htmlentities($s, \ENT_QUOTES);
|
|
}
|
|
}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct(string $s) {
|
|
$this->s = $s;
|
|
}
|
|
}
|
|
|
|
class O2 {
|
|
public string $t;
|
|
|
|
public function __construct() {
|
|
$this->t = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 {
|
|
public function foo() : void {
|
|
$o = new O1((string) $_GET["FOO"]);
|
|
echo U::escape(U::shorten($o->s));
|
|
}
|
|
}
|
|
|
|
class V2 {
|
|
public function foo(O2 $o) : void {
|
|
echo U::shorten(U::escape($o->t));
|
|
}
|
|
}'
|
|
],
|
|
'taintPropertyPassingObjectWithDifferentValue' => [
|
|
'<?phps
|
|
/** @psalm-immutable */
|
|
class User {
|
|
public string $id;
|
|
public $name = "Luke";
|
|
|
|
public function __construct(string $userId) {
|
|
$this->id = $userId;
|
|
}
|
|
}
|
|
|
|
class UserUpdater {
|
|
public static function doDelete(PDO $pdo, User $user) : void {
|
|
self::deleteUser($pdo, $user->name);
|
|
}
|
|
|
|
public static function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}
|
|
|
|
$userObj = new User((string) $_GET["user_id"]);
|
|
UserUpdater::doDelete(new PDO(), $userObj);'
|
|
],
|
|
'taintPropertyWithoutPassingObject' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class User {
|
|
public string $id;
|
|
|
|
public function __construct(string $userId) {
|
|
$this->id = $userId;
|
|
}
|
|
|
|
public function setId(string $userId) : void {
|
|
$this->id = $userId;
|
|
}
|
|
}
|
|
|
|
function echoId(User $u2) : void {
|
|
echo $u2->id;
|
|
}
|
|
|
|
$u = new User("5");
|
|
echoId($u);
|
|
$u->setId($_GET["user_id"]);',
|
|
],
|
|
'specializeStaticMethod' => [
|
|
'<?php
|
|
StringUtility::foo($_GET["c"]);
|
|
|
|
class StringUtility {
|
|
/**
|
|
* @psalm-taint-specialize
|
|
*/
|
|
public static function foo(string $str) : string
|
|
{
|
|
return $str;
|
|
}
|
|
|
|
/**
|
|
* @psalm-taint-specialize
|
|
*/
|
|
public static function slugify(string $url) : string {
|
|
return self::foo($url);
|
|
}
|
|
}
|
|
|
|
echo StringUtility::slugify("hello");'
|
|
],
|
|
'taintFreeNestedArray' => [
|
|
'<?php
|
|
$a = [];
|
|
$a[] = ["a" => $_GET["name"], "b" => "foo"];
|
|
|
|
foreach ($a as $m) {
|
|
echo $m["b"];
|
|
}'
|
|
],
|
|
'taintFreeNestedArrayWithOffsetAccessedExplicitly' => [
|
|
'<?php
|
|
$a = [];
|
|
$a[] = ["a" => $_GET["name"], "b" => "foo"];
|
|
|
|
echo $a[0]["b"];',
|
|
],
|
|
'intUntainted' => [
|
|
'<?php
|
|
$input = $_GET[\'input\'];
|
|
if (is_int($input)) {
|
|
echo "$input";
|
|
}',
|
|
],
|
|
'dontTaintSpecializedInstanceProperty' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class StringHolder {
|
|
public $x;
|
|
|
|
public function __construct(string $x) {
|
|
$this->x = $x;
|
|
}
|
|
}
|
|
|
|
$a = new StringHolder("a");
|
|
$b = new StringHolder($_GET["x"]);
|
|
|
|
echo $a->x;'
|
|
],
|
|
'dontTaintSpecializedCallsForAnonymousInstance' => [
|
|
'<?php
|
|
|
|
class StringRenderer {
|
|
/** @psalm-taint-specialize */
|
|
public function render(string $x) {
|
|
return $x;
|
|
}
|
|
}
|
|
|
|
$notEchoed = (new StringRenderer())->render($_GET["untrusted"]);
|
|
echo (new StringRenderer())->render("a");'
|
|
],
|
|
'dontTaintSpecializedCallsForStubMadeInstance' => [
|
|
'<?php
|
|
|
|
class StringRenderer {
|
|
/** @psalm-taint-specialize */
|
|
public function render(string $x) {
|
|
return $x;
|
|
}
|
|
}
|
|
|
|
/** @psalm-suppress InvalidReturnType */
|
|
function stub(): StringRenderer { }
|
|
|
|
$notEchoed = stub()->render($_GET["untrusted"]);
|
|
echo stub()->render("a");'
|
|
],
|
|
'suppressTaintedInput' => [
|
|
'<?php
|
|
function unsafe() {
|
|
/**
|
|
* @psalm-suppress TaintedInput
|
|
*/
|
|
echo $_GET["x"];
|
|
}'
|
|
],
|
|
'suppressTaintedAssignment' => [
|
|
'<?php
|
|
$b = $_GET["x"];
|
|
|
|
/**
|
|
* @psalm-suppress TaintedInput
|
|
*/
|
|
$a = $b;
|
|
|
|
|
|
echo $a;'
|
|
],
|
|
'dontPropagateTaintToChildConstructor' => [
|
|
'<?php
|
|
class A {
|
|
public function __construct(string $a) {}
|
|
}
|
|
|
|
class B extends A {
|
|
public function __construct(string $a) {
|
|
echo $a;
|
|
}
|
|
}
|
|
|
|
new A($_GET["foo"]);'
|
|
],
|
|
'dontTaintThroughChildConstructorWhenMethodOverridden' => [
|
|
'<?php //--taint-analysis
|
|
class A {
|
|
private $taint;
|
|
|
|
public function __construct($taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {
|
|
public function __construct($taint) {}
|
|
}
|
|
|
|
$b = new B($_GET["bar"]);
|
|
echo $b->getTaint();'
|
|
],
|
|
'immutableClassTrackInputThroughMethod' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-immutable
|
|
*/
|
|
class A {
|
|
private string $taint = "";
|
|
|
|
public function __construct(string $taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
$b = new A($_GET["bar"]);
|
|
$a = new A("bar");
|
|
echo $a->getTaint();',
|
|
],
|
|
'literalStringCannotCarryTaint' => [
|
|
'<?php
|
|
$file = $_GET["foo"];
|
|
|
|
if ($file !== "") {
|
|
/**
|
|
* @psalm-taint-escape input
|
|
*/
|
|
$file = basename($file);
|
|
}
|
|
|
|
echo $file;'
|
|
],
|
|
'strTrNotTainted' => [
|
|
'<?php
|
|
$input = strtr(\'data\', \'data\', \'data\');
|
|
setcookie($input, \'value\');',
|
|
],
|
|
'conditionallyEscapedTaintPassedTrue' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-taint-escape ($escape is true ? "html" : null)
|
|
*/
|
|
function foo(string $string, bool $escape = true): string {
|
|
if ($escape) {
|
|
$string = htmlspecialchars($string);
|
|
}
|
|
|
|
return $string;
|
|
}
|
|
|
|
echo foo($_GET["foo"], true);
|
|
echo foo($_GET["foo"]);'
|
|
],
|
|
'conditionallyEscapedTaintPassedTrueStaticCall' => [
|
|
'<?php
|
|
class U {
|
|
/**
|
|
* @psalm-taint-escape ($escape is true ? "html" : null)
|
|
*/
|
|
public static function foo(string $string, bool $escape = true): string {
|
|
if ($escape) {
|
|
$string = htmlspecialchars($string);
|
|
}
|
|
|
|
return $string;
|
|
}
|
|
}
|
|
|
|
echo U::foo($_GET["foo"], true);
|
|
echo U::foo($_GET["foo"]);'
|
|
],
|
|
'keysAreNotTainted' => [
|
|
'<?php
|
|
function takesArray(array $arr): void {
|
|
foreach ($arr as $key => $_) {
|
|
echo $key;
|
|
}
|
|
}
|
|
|
|
takesArray(["good" => $_GET["bad"]]);'
|
|
],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @return array<string, array{0: string, error_message: string}>
|
|
*/
|
|
public function providerInvalidCodeParse(): array
|
|
{
|
|
return [
|
|
'taintedInputFromMethodReturnTypeSimple' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->getUserId();
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputFromFunctionReturnType' => [
|
|
'<?php
|
|
function getName() : string {
|
|
return $_GET["name"] ?? "unknown";
|
|
}
|
|
|
|
echo getName();',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:6:26 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:3:32) -> coalesce (src' . DIRECTORY_SEPARATOR . 'somefile.php:3:32) -> getName (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:42) -> call to echo (src' . DIRECTORY_SEPARATOR . 'somefile.php:6:26) -> echo#1',
|
|
],
|
|
'taintedInputFromExplicitTaintSource' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-taint-source input
|
|
*/
|
|
function getName() : string {
|
|
return "";
|
|
}
|
|
|
|
echo getName();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputFromExplicitTaintSourceStaticMethod' => [
|
|
'<?php
|
|
class Request {
|
|
/**
|
|
* @psalm-taint-source input
|
|
*/
|
|
public static function getName() : string {
|
|
return "";
|
|
}
|
|
}
|
|
|
|
|
|
echo Request::getName();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputFromGetArray' => [
|
|
'<?php
|
|
function getName(array $data) : string {
|
|
return $data["name"] ?? "unknown";
|
|
}
|
|
|
|
$name = getName($_GET);
|
|
|
|
echo $name;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputFromReturnToInclude' => [
|
|
'<?php
|
|
$a = (string) $_GET["file"];
|
|
$b = "hello" . $a;
|
|
include str_replace("a", "b", $b);',
|
|
'error_message' => 'TaintedInclude',
|
|
],
|
|
'taintedInputFromReturnToEval' => [
|
|
'<?php
|
|
$a = $_GET["file"];
|
|
eval("<?php" . $a);',
|
|
'error_message' => 'TaintedEval',
|
|
],
|
|
'taintedInputFromReturnTypeToEcho' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->getUserId();
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
echo $userId;
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputInCreatedArrayIsEchoed' => [
|
|
'<?php
|
|
$name = $_GET["name"] ?? "unknown";
|
|
|
|
$data = ["name" => $name];
|
|
|
|
echo "<h1>" . $data["name"] . "</h1>";',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'testTaintedInputInAssignedArrayIsEchoed' => [
|
|
'<?php
|
|
$name = $_GET["name"] ?? "unknown";
|
|
|
|
$data = [];
|
|
$data["name"] = $name;
|
|
|
|
echo "<h1>" . $data["name"] . "</h1>";',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputDirectly' => [
|
|
'<?php
|
|
class A {
|
|
public function deleteUser(PDO $pdo) : void {
|
|
$userId = (string) $_GET["user_id"];
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputFromReturnTypeWithBranch' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
$userId = $this->getUserId();
|
|
|
|
if (rand(0, 1)) {
|
|
$userId .= "aaa";
|
|
} else {
|
|
$userId .= "bb";
|
|
}
|
|
|
|
return $userId;
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'sinkAnnotation' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->getUserId();
|
|
}
|
|
|
|
public function deleteUser(PDOWrapper $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}
|
|
|
|
class PDOWrapper {
|
|
/**
|
|
* @psalm-taint-sink sql $sql
|
|
*/
|
|
public function exec(string $sql) : void {}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputFromParam' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId() : string {
|
|
return (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->getUserId();
|
|
}
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$this->deleteUser($pdo, $userId);
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql - src' . DIRECTORY_SEPARATOR . 'somefile.php:17:40 - Detected tainted SQL in path: $_GET -> $_GET[\'user_id\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:4:45) -> A::getUserId (src' . DIRECTORY_SEPARATOR . 'somefile.php:3:55) -> concat (src' . DIRECTORY_SEPARATOR . 'somefile.php:8:36) -> A::getAppendedUserId (src' . DIRECTORY_SEPARATOR . 'somefile.php:7:63) -> $userId (src' . DIRECTORY_SEPARATOR . 'somefile.php:12:29) -> call to A::deleteUser (src' . DIRECTORY_SEPARATOR . 'somefile.php:13:53) -> $userId (src' . DIRECTORY_SEPARATOR . 'somefile.php:16:69) -> call to PDO::exec (src' . DIRECTORY_SEPARATOR . 'somefile.php:17:40) -> PDO::exec#1',
|
|
],
|
|
'taintedInputToParam' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId(PDO $pdo) : void {
|
|
$this->deleteUser(
|
|
$pdo,
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
);
|
|
}
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
return "aaa" . $user_id;
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputToParamAfterAssignment' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId(PDO $pdo) : void {
|
|
$this->deleteUser(
|
|
$pdo,
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
);
|
|
}
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
return "aaa" . $user_id;
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$userId2 = $userId;
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputToParamAlternatePath' => [
|
|
'<?php
|
|
class A {
|
|
public function getUserId(PDO $pdo) : void {
|
|
$this->deleteUser(
|
|
$pdo,
|
|
self::doFoo(),
|
|
$this->getAppendedUserId((string) $_GET["user_id"])
|
|
);
|
|
}
|
|
|
|
public function getAppendedUserId(string $user_id) : string {
|
|
return "aaa" . $user_id;
|
|
}
|
|
|
|
public static function doFoo() : string {
|
|
return "hello";
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId, string $userId2) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
|
|
if (rand(0, 1)) {
|
|
$pdo->exec("delete from users where user_id = " . $userId2);
|
|
}
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql - src' . DIRECTORY_SEPARATOR . 'somefile.php:23:44 - Detected tainted SQL in path: $_GET -> $_GET[\'user_id\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:7:67) -> call to A::getAppendedUserId (src' . DIRECTORY_SEPARATOR . 'somefile.php:7:58) -> $user_id (src' . DIRECTORY_SEPARATOR . 'somefile.php:11:66) -> concat (src' . DIRECTORY_SEPARATOR . 'somefile.php:12:36) -> A::getAppendedUserId (src' . DIRECTORY_SEPARATOR . 'somefile.php:11:78) -> call to A::deleteUser (src' . DIRECTORY_SEPARATOR . 'somefile.php:7:33) -> $userId2 (src' . DIRECTORY_SEPARATOR . 'somefile.php:19:85) -> call to PDO::exec (src' . DIRECTORY_SEPARATOR . 'somefile.php:23:44) -> PDO::exec#1',
|
|
],
|
|
'taintedInParentLoader' => [
|
|
'<?php
|
|
abstract class A {
|
|
abstract public static function loadPartial(string $sink) : void;
|
|
|
|
public static function loadFull(string $sink) : void {
|
|
static::loadPartial($sink);
|
|
}
|
|
}
|
|
|
|
function getPdo() : PDO {
|
|
return new PDO("connectionstring");
|
|
}
|
|
|
|
class AChild extends A {
|
|
public static function loadPartial(string $sink) : void {
|
|
getPdo()->exec("select * from foo where bar = " . $sink);
|
|
}
|
|
}
|
|
|
|
class AGrandChild extends AChild {}
|
|
|
|
class C {
|
|
public function foo(string $user_id) : void {
|
|
AGrandChild::loadFull($user_id);
|
|
}
|
|
}
|
|
|
|
(new C)->foo((string) $_GET["user_id"]);',
|
|
'error_message' => 'TaintedSql - src' . DIRECTORY_SEPARATOR . 'somefile.php:16:44 - Detected tainted SQL in path: $_GET -> $_GET[\'user_id\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:28:43) -> call to C::foo (src' . DIRECTORY_SEPARATOR . 'somefile.php:28:34) -> $user_id (src' . DIRECTORY_SEPARATOR . 'somefile.php:23:52) -> call to AGrandChild::loadFull (src' . DIRECTORY_SEPARATOR . 'somefile.php:24:51) -> AGrandChild::loadFull#1 (src' . DIRECTORY_SEPARATOR . 'somefile.php:5:64) -> A::loadFull#1 (src' . DIRECTORY_SEPARATOR . 'somefile.php:24:51) -> $sink (src' . DIRECTORY_SEPARATOR . 'somefile.php:5:64) -> call to A::loadPartial (src' . DIRECTORY_SEPARATOR . 'somefile.php:6:49) -> A::loadPartial#1 (src' . DIRECTORY_SEPARATOR . 'somefile.php:3:76) -> AChild::loadPartial#1 (src' . DIRECTORY_SEPARATOR . 'somefile.php:6:49) -> $sink (src' . DIRECTORY_SEPARATOR . 'somefile.php:15:67) -> call to PDO::exec (src' . DIRECTORY_SEPARATOR . 'somefile.php:16:44) -> PDO::exec#1',
|
|
],
|
|
'taintedInputFromProperty' => [
|
|
'<?php
|
|
class A {
|
|
public string $userId;
|
|
|
|
public function __construct() {
|
|
$this->userId = (string) $_GET["user_id"];
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->userId;
|
|
}
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$this->deleteUser($pdo, $userId);
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputFromPropertyViaMixin' => [
|
|
'<?php
|
|
class A {
|
|
public string $userId;
|
|
|
|
public function __construct() {
|
|
$this->userId = (string) $_GET["user_id"];
|
|
}
|
|
}
|
|
|
|
/** @mixin A */
|
|
class B {
|
|
private A $a;
|
|
|
|
public function __construct(A $a) {
|
|
$this->a = $a;
|
|
}
|
|
|
|
public function __get(string $name) {
|
|
return $this->a->$name;
|
|
}
|
|
}
|
|
|
|
class C {
|
|
private B $b;
|
|
|
|
public function __construct(B $b) {
|
|
$this->b = $b;
|
|
}
|
|
|
|
public function getAppendedUserId() : string {
|
|
return "aaaa" . $this->b->userId;
|
|
}
|
|
|
|
public function doDelete(PDO $pdo) : void {
|
|
$userId = $this->getAppendedUserId();
|
|
$this->deleteUser($pdo, $userId);
|
|
}
|
|
|
|
public function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintedInputViaStaticFunction' => [
|
|
'<?php
|
|
class Utils {
|
|
public static function shorten(string $str) : string {
|
|
return $str;
|
|
}
|
|
}
|
|
|
|
class A {
|
|
public function foo() : void {
|
|
echo(Utils::shorten((string) $_GET["user_id"]));
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputViaPureStaticFunction' => [
|
|
'<?php
|
|
class Utils {
|
|
/**
|
|
* @psalm-pure
|
|
*/
|
|
public static function shorten(string $str) : string {
|
|
return substr($str, 0, 100);
|
|
}
|
|
}
|
|
|
|
class A {
|
|
public function foo() : void {
|
|
echo(Utils::shorten((string) $_GET["user_id"]));
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'untaintedInputViaStaticFunctionWithoutSafePath' => [
|
|
'<?php
|
|
class Utils {
|
|
/**
|
|
* @psalm-pure
|
|
*/
|
|
public static function shorten(string $str) : string {
|
|
return $str;
|
|
}
|
|
}
|
|
|
|
class A {
|
|
public function foo() : void {
|
|
echo(Utils::shorten((string) $_GET["user_id"]));
|
|
}
|
|
|
|
public function bar() : void {
|
|
echo(Utils::shorten("hello"));
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInputFromMagicProperty' => [
|
|
'<?php
|
|
/**
|
|
* @property string $userId
|
|
*/
|
|
class A {
|
|
/** @var array<string, string> */
|
|
private $vars = [];
|
|
|
|
public function __get(string $s) : string {
|
|
return $this->vars[$s];
|
|
}
|
|
|
|
public function __set(string $s, string $t) {
|
|
$this->vars[$s] = $t;
|
|
}
|
|
}
|
|
|
|
function getAppendedUserId() : void {
|
|
$a = new A();
|
|
$a->userId = (string) $_GET["user_id"];
|
|
echo $a->userId;
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintOverMixed' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-suppress MixedAssignment
|
|
* @psalm-suppress MixedArgument
|
|
*/
|
|
function foo() : void {
|
|
$a = $_GET["bad"];
|
|
echo $a;
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintStrConversion' => [
|
|
'<?php
|
|
function foo() : void {
|
|
$a = strtoupper(strtolower((string) $_GET["bad"]));
|
|
echo $a;
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintIntoExec' => [
|
|
'<?php
|
|
function foo() : void {
|
|
$a = (string) $_GET["bad"];
|
|
exec($a);
|
|
}',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintIntoExecMultipleConcat' => [
|
|
'<?php
|
|
function foo() : void {
|
|
$a = "9" . "a" . "b" . "c" . ((string) $_GET["bad"]) . "d" . "e" . "f";
|
|
exec($a);
|
|
}',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintIntoNestedArrayUnnestedSeparately' => [
|
|
'<?php
|
|
function foo() : void {
|
|
$a = [[(string) $_GET["bad"]]];
|
|
exec($a[0][0]);
|
|
}',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintIntoArrayAndThenOutAgain' => [
|
|
'<?php
|
|
class C {
|
|
public static function foo() : array {
|
|
$a = (string) $_GET["bad"];
|
|
return [$a];
|
|
}
|
|
|
|
public static function bar() {
|
|
exec(self::foo()[0]);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintAppendedToArray' => [
|
|
'<?php
|
|
class C {
|
|
public static function foo() : array {
|
|
$a = [];
|
|
$a[] = (string) $_GET["bad"];
|
|
return $a;
|
|
}
|
|
|
|
public static function bar() {
|
|
exec(self::foo()[0]);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintOnSubstrCall' => [
|
|
'<?php
|
|
class U {
|
|
/** @psalm-pure */
|
|
public static function shorten(string $s) : string {
|
|
return substr($s, 0, 15);
|
|
}
|
|
}
|
|
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
echo U::shorten($o->s);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintOnStrReplaceCallSimple' => [
|
|
'<?php
|
|
class U {
|
|
/** @psalm-pure */
|
|
public static function shorten(string $s) : string {
|
|
return str_replace("foo", "bar", $s);
|
|
}
|
|
}
|
|
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
echo U::shorten($o->s);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintOnPregReplaceCall' => [
|
|
'<?php
|
|
class U {
|
|
/** @psalm-pure */
|
|
public static function shorten(string $s) : string {
|
|
return preg_replace("/foo/", "bar", $s);
|
|
}
|
|
}
|
|
|
|
class V {}
|
|
|
|
class O1 {
|
|
public string $s;
|
|
|
|
public function __construct() {
|
|
$this->s = (string) $_GET["FOO"];
|
|
}
|
|
}
|
|
|
|
class V1 extends V {
|
|
public function foo(O1 $o) : void {
|
|
echo U::shorten($o->s);
|
|
}
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'IndirectGetAssignment' => [
|
|
'<?php
|
|
class InputFilter {
|
|
public string $name;
|
|
|
|
public function __construct(string $name) {
|
|
$this->name = $name;
|
|
}
|
|
|
|
/**
|
|
* @psalm-specialize-call
|
|
*/
|
|
public function getArg(string $method, string $type)
|
|
{
|
|
$arg = null;
|
|
|
|
switch ($method) {
|
|
case "post":
|
|
if (isset($_POST[$this->name])) {
|
|
$arg = $_POST[$this->name];
|
|
}
|
|
break;
|
|
|
|
case "get":
|
|
if (isset($_GET[$this->name])) {
|
|
$arg = $_GET[$this->name];
|
|
}
|
|
break;
|
|
}
|
|
|
|
return $this->filterInput($type, $arg);
|
|
}
|
|
|
|
protected function filterInput(string $type, $arg)
|
|
{
|
|
// input is null
|
|
if ($arg === null) {
|
|
return null;
|
|
}
|
|
|
|
// set to null if sanitize clears arg
|
|
if ($arg === "") {
|
|
$arg = null;
|
|
}
|
|
|
|
// type casting
|
|
if ($arg !== null) {
|
|
$arg = $this->typeCastInput($type, $arg);
|
|
}
|
|
|
|
return $arg;
|
|
}
|
|
|
|
protected function typeCastInput(string $type, $arg) {
|
|
if ($type === "string") {
|
|
return (string) $arg;
|
|
}
|
|
|
|
return null;
|
|
}
|
|
}
|
|
|
|
echo (new InputFilter("hello"))->getArg("get", "string");',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintPropertyPassingObject' => [
|
|
'<?php
|
|
/** @psalm-immutable */
|
|
class User {
|
|
public string $id;
|
|
|
|
public function __construct(string $userId) {
|
|
$this->id = $userId;
|
|
}
|
|
}
|
|
|
|
class UserUpdater {
|
|
public static function doDelete(PDO $pdo, User $user) : void {
|
|
self::deleteUser($pdo, $user->id);
|
|
}
|
|
|
|
public static function deleteUser(PDO $pdo, string $userId) : void {
|
|
$pdo->exec("delete from users where user_id = " . $userId);
|
|
}
|
|
}
|
|
|
|
$userObj = new User((string) $_GET["user_id"]);
|
|
UserUpdater::doDelete(new PDO(), $userObj);',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'taintPropertyPassingObjectSettingValueLater' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class User {
|
|
public string $id;
|
|
|
|
public function __construct(string $userId) {
|
|
$this->id = $userId;
|
|
}
|
|
|
|
public function setId(string $userId) : void {
|
|
$this->id = $userId;
|
|
}
|
|
}
|
|
|
|
function echoId(User $u2) : void {
|
|
echo $u2->id;
|
|
}
|
|
|
|
$u = new User("5");
|
|
$u->setId($_GET["user_id"]);
|
|
echoId($u);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'ImplodeExplode' => [
|
|
'<?php
|
|
$a = $_GET["name"];
|
|
$b = explode(" ", $a);
|
|
$c = implode(" ", $b);
|
|
echo $c;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'ImplodeIndirect' => [
|
|
'<?php
|
|
/** @var array $unsafe */
|
|
$unsafe = $_GET[\'unsafe\'];
|
|
echo implode(" ", $unsafe);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughPregReplaceCallback' => [
|
|
'<?php
|
|
$a = $_GET["bad"];
|
|
|
|
$b = preg_replace_callback(
|
|
\'/foo/\',
|
|
function (array $matches) : string {
|
|
return $matches[1];
|
|
},
|
|
$a
|
|
);
|
|
|
|
echo $b;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedFunctionWithNoTypes' => [
|
|
'<?php
|
|
function rawinput() {
|
|
return $_GET[\'rawinput\'];
|
|
}
|
|
|
|
echo rawinput();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedStaticCallWithNoTypes' => [
|
|
'<?php
|
|
class A {
|
|
public static function rawinput() {
|
|
return $_GET[\'rawinput\'];
|
|
}
|
|
}
|
|
|
|
echo A::rawinput();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedInstanceCallWithNoTypes' => [
|
|
'<?php
|
|
class A {
|
|
public function rawinput() {
|
|
return $_GET[\'rawinput\'];
|
|
}
|
|
}
|
|
|
|
echo (new A())->rawinput();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintStringObtainedUsingStrval' => [
|
|
'<?php
|
|
$unsafe = strval($_GET[\'unsafe\']);
|
|
echo $unsafe',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintStringObtainedUsingSprintf' => [
|
|
'<?php
|
|
$unsafe = sprintf("%s", strval($_GET[\'unsafe\']));
|
|
echo $unsafe;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'encapsulatedString' => [
|
|
'<?php
|
|
$unsafe = $_GET[\'unsafe\'];
|
|
echo "$unsafe";',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'encapsulatedToStringMagic' => [
|
|
'<?php
|
|
class MyClass {
|
|
public function __toString() {
|
|
return $_GET["blah"];
|
|
}
|
|
}
|
|
$unsafe = new MyClass();
|
|
echo "unsafe: $unsafe";',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'castToStringMagic' => [
|
|
'<?php
|
|
class MyClass {
|
|
public function __toString() {
|
|
return $_GET["blah"];
|
|
}
|
|
}
|
|
$unsafe = new MyClass();
|
|
echo $unsafe;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'castToStringViaArgument' => [
|
|
'<?php
|
|
class MyClass {
|
|
public function __toString() {
|
|
return $_GET["blah"];
|
|
}
|
|
}
|
|
|
|
function doesEcho(string $s) {
|
|
echo $s;
|
|
}
|
|
|
|
$unsafe = new MyClass();
|
|
|
|
doesEcho($unsafe);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'toStringTaintInSubclass' => [
|
|
'<?php // --taint-analysis
|
|
class TaintedBaseClass {
|
|
/** @psalm-taint-source input */
|
|
public function __toString() {
|
|
return "x";
|
|
}
|
|
}
|
|
class TaintedSubclass extends TaintedBaseClass {}
|
|
$x = new TaintedSubclass();
|
|
echo "Caught: $x\n";',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'implicitToStringMagic' => [
|
|
'<?php
|
|
class MyClass {
|
|
public function __toString() {
|
|
return $_GET["blah"];
|
|
}
|
|
}
|
|
$unsafe = new MyClass();
|
|
echo $unsafe;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'namespacedFunction' => [
|
|
'<?php
|
|
namespace ns;
|
|
|
|
function identity(string $s) : string {
|
|
return $s;
|
|
}
|
|
|
|
echo identity($_GET[\'userinput\']);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'print' => [
|
|
'<?php
|
|
print($_GET["name"]);',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:27 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:27) -> call to print (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:27) -> print#1',
|
|
],
|
|
'printf' => [
|
|
'<?php
|
|
printf($_GET["name"]);',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:28 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:28) -> call to printf (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:28) -> printf#1',
|
|
],
|
|
'print_r' => [
|
|
'<?php
|
|
print_r($_GET["name"]);',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:29 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:29) -> call to print_r (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:29) -> print_r#1',
|
|
],
|
|
'var_dump' => [
|
|
'<?php
|
|
var_dump($_GET["name"]);',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:30 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:30) -> call to var_dump (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:30) -> var_dump#1',
|
|
],
|
|
'var_export' => [
|
|
'<?php
|
|
var_export($_GET["name"]);',
|
|
'error_message' => 'TaintedHtml - src' . DIRECTORY_SEPARATOR . 'somefile.php:2:32 - Detected tainted HTML in path: $_GET -> $_GET[\'name\'] (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:32) -> call to var_export (src' . DIRECTORY_SEPARATOR . 'somefile.php:2:32) -> var_export#1',
|
|
],
|
|
'unpackArgs' => [
|
|
'<?php
|
|
function test(...$args) {
|
|
echo $args[0];
|
|
}
|
|
test(...$_GET["other"]);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'foreachArg' => [
|
|
'<?php
|
|
$a = $_GET["bad"];
|
|
|
|
foreach ($a as $arg) {
|
|
echo $arg;
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'magicPropertyType' => [
|
|
'<?php
|
|
class Magic {
|
|
private $params = [];
|
|
|
|
public function __get(string $a) {
|
|
return $this->params[$a];
|
|
}
|
|
|
|
public function __set(string $a, $value) {
|
|
$this->params[$a] = $value;
|
|
}
|
|
}
|
|
|
|
$m = new Magic();
|
|
$m->taint = $_GET["input"];
|
|
echo $m->taint;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintNestedArrayWithOffsetAccessedInForeach' => [
|
|
'<?php
|
|
$a = [];
|
|
$a[0] = ["a" => $_GET["name"], "b" => "foo"];
|
|
|
|
foreach ($a as $m) {
|
|
echo $m["a"];
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintNestedArrayWithOffsetAccessedExplicitly' => [
|
|
'<?php
|
|
$a = [];
|
|
$a[] = ["a" => $_GET["name"], "b" => "foo"];
|
|
|
|
echo $a[0]["a"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughArrayMapExplicitClosure' => [
|
|
'<?php
|
|
$get = array_map(function($str) { return trim($str);}, $_GET);
|
|
echo $get["test"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughArrayMapExplicitTypedClosure' => [
|
|
'<?php
|
|
$get = array_map(function(string $str) : string { return trim($str);}, $_GET);
|
|
echo $get["test"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughArrayMapExplicitArrowFunction' => [
|
|
'<?php
|
|
$get = array_map(fn($str) => trim($str), $_GET);
|
|
echo $get["test"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughArrayMapImplicitFunctionCall' => [
|
|
'<?php
|
|
$a = ["test" => $_GET["name"]];
|
|
$get = array_map("trim", $a);
|
|
echo $get["test"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintFilterVarCallback' => [
|
|
'<?php
|
|
$get = filter_var($_GET, FILTER_CALLBACK, ["options" => "trim"]);
|
|
|
|
echo $get["test"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintAfterReconciledType' => [
|
|
'<?php
|
|
$input = $_GET[\'input\'];
|
|
if (is_string($input)) {
|
|
echo "$input";
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintExit' => [
|
|
'<?php
|
|
if (rand(0, 1)) {
|
|
exit($_GET[\'a\']);
|
|
} else {
|
|
die($_GET[\'b\']);
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintSpecializedMethod' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class Unsafe {
|
|
public function isUnsafe() {
|
|
return $_GET["unsafe"];
|
|
}
|
|
}
|
|
$a = new Unsafe();
|
|
echo $a->isUnsafe();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintSpecializedMethodForAnonymousInstance' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class Unsafe {
|
|
public function isUnsafe() {
|
|
return $_GET["unsafe"];
|
|
}
|
|
}
|
|
echo (new Unsafe())->isUnsafe();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintSpecializedMethodForStubMadeInstance' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class Unsafe {
|
|
public function isUnsafe() {
|
|
return $_GET["unsafe"];
|
|
}
|
|
}
|
|
|
|
/** @psalm-suppress InvalidReturnType */
|
|
function stub(): Unsafe { }
|
|
|
|
echo stub()->isUnsafe();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'doTaintSpecializedInstanceProperty' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
class StringHolder {
|
|
public $x;
|
|
|
|
public function __construct(string $x) {
|
|
$this->x = $x;
|
|
}
|
|
}
|
|
|
|
$b = new StringHolder($_GET["x"]);
|
|
|
|
echo $b->x;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintUnserialize' => [
|
|
'<?php
|
|
$cb = unserialize($_POST[\'x\']);',
|
|
'error_message' => 'TaintedUnserialize',
|
|
],
|
|
'taintCreateFunction' => [
|
|
'<?php
|
|
$cb = create_function(\'$a\', $_GET[\'x\']);',
|
|
'error_message' => 'TaintedEval',
|
|
],
|
|
'taintException' => [
|
|
'<?php
|
|
$e = new Exception();
|
|
echo $e;',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintError' => [
|
|
'<?php
|
|
function foo() {}
|
|
try {
|
|
foo();
|
|
} catch (TypeError $e) {
|
|
echo "Caught: {$e->getTraceAsString()}\n";
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThrowable' => [
|
|
'<?php
|
|
function foo() {}
|
|
try {
|
|
foo();
|
|
} catch (Throwable $e) {
|
|
echo "Caught: $e"; // TODO: ("Caught" . $e) does not work.
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintReturnedArray' => [
|
|
'<?php
|
|
function processParams(array $params) : array {
|
|
if (isset($params["foo"])) {
|
|
return $params;
|
|
}
|
|
|
|
return [];
|
|
}
|
|
|
|
$params = processParams($_GET);
|
|
|
|
echo $params["foo"];',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintFlow' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-flow ($r) -> return
|
|
*/
|
|
function some_stub(string $r): string {}
|
|
|
|
$r = $_GET["untrusted"];
|
|
|
|
echo some_stub($r);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintFlowProxy' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-taint-sink callable $in
|
|
*/
|
|
function dummy_taint_sink(string $in): void {}
|
|
|
|
/**
|
|
* @psalm-flow proxy dummy_taint_sink($r)
|
|
*/
|
|
function some_stub(string $r): string {}
|
|
|
|
$r = $_GET["untrusted"];
|
|
|
|
some_stub($r);',
|
|
'error_message' => 'TaintedCallable',
|
|
],
|
|
'taintFlowProxyAndReturn' => [
|
|
'<?php
|
|
function dummy_taintable(string $in): string {
|
|
return $in;
|
|
}
|
|
|
|
/**
|
|
* @psalm-flow proxy dummy_taintable($r) -> return
|
|
*/
|
|
function some_stub(string $r): string {}
|
|
|
|
$r = $_GET["untrusted"];
|
|
|
|
echo some_stub($r);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintFlowMethodProxyAndReturn' => [
|
|
'<?php
|
|
class dummy {
|
|
public function taintable(string $in): string {
|
|
return $in;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @psalm-flow proxy dummy::taintable($r) -> return
|
|
*/
|
|
function some_stub(string $r): string {}
|
|
|
|
$r = $_GET["untrusted"];
|
|
|
|
echo some_stub($r);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintPopen' => [
|
|
'<?php
|
|
$cb = popen($_POST[\'x\'], \'r\');',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintProcOpen' => [
|
|
'<?php
|
|
$arr = [];
|
|
$cb = proc_open($_POST[\'x\'], [], $arr);',
|
|
'error_message' => 'TaintedShell',
|
|
],
|
|
'taintedCurlInit' => [
|
|
'<?php
|
|
$ch = curl_init($_GET[\'url\']);',
|
|
'error_message' => 'TaintedSSRF',
|
|
],
|
|
'taintedCurlSetOpt' => [
|
|
'<?php
|
|
$ch = curl_init();
|
|
curl_setopt($ch, CURLOPT_URL, $_GET[\'url\']);',
|
|
'error_message' => 'TaintedSSRF',
|
|
],
|
|
'taintThroughChildConstructorWithoutMethodOverride' => [
|
|
'<?php //--taint-analysis
|
|
class A {
|
|
private $taint;
|
|
|
|
public function __construct($taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {}
|
|
|
|
|
|
$b = new B($_GET["bar"]);
|
|
echo $b->getTaint();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughChildConstructorCallingParentMethod' => [
|
|
'<?php //--taint-analysis
|
|
class A {
|
|
private $taint;
|
|
|
|
public function __construct($taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {}
|
|
|
|
class C extends B {}
|
|
|
|
$c = new C($_GET["bar"]);
|
|
|
|
function foo(B $b) {
|
|
echo $b->getTaint();
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughChildConstructorCallingGrandParentMethod' => [
|
|
'<?php //--taint-analysis
|
|
class A {
|
|
private $taint;
|
|
|
|
public function __construct($taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {}
|
|
|
|
class C extends B {}
|
|
|
|
$c = new C($_GET["bar"]);
|
|
|
|
function foo(A $a) {
|
|
echo $a->getTaint();
|
|
}',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughChildConstructorWhenMethodOverriddenWithParentConstructorCall' => [
|
|
'<?php //--taint-analysis
|
|
class A {
|
|
private $taint;
|
|
|
|
public function __construct($taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {
|
|
public function __construct($taint) {
|
|
parent::__construct($taint);
|
|
}
|
|
}
|
|
|
|
$b = new B($_GET["bar"]);
|
|
echo $b->getTaint();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintedLdapSearch' => [
|
|
'<?php
|
|
$ds = ldap_connect(\'example.com\');
|
|
$dn = \'o=Psalm, c=US\';
|
|
$filter = $_GET[\'filter\'];
|
|
ldap_search($ds, $dn, $filter, []);',
|
|
'error_message' => 'TaintedLdap',
|
|
],
|
|
'taintedFile' => [
|
|
'<?php
|
|
file_get_contents($_GET[\'taint\']);',
|
|
'error_message' => 'TaintedFile',
|
|
],
|
|
'taintedHeader' => [
|
|
'<?php
|
|
header($_GET[\'taint\']);',
|
|
'error_message' => 'TaintedHeader',
|
|
],
|
|
'taintedCookie' => [
|
|
'<?php
|
|
setcookie($_GET[\'taint\'], \'value\');',
|
|
'error_message' => 'TaintedCookie',
|
|
],
|
|
'variadicTaintPropagation' => [
|
|
'<?php
|
|
|
|
/**
|
|
* @psalm-pure
|
|
*
|
|
* @param string|int|float $args
|
|
*
|
|
* @psalm-flow ($format, $args) -> return
|
|
*/
|
|
function variadic_test(string $format, ...$args) : string {
|
|
}
|
|
|
|
echo variadic_test(\'\', \'\', $_GET[\'taint\'], \'\');',
|
|
'error_message' => 'TaintedHtml'
|
|
],
|
|
'potentialTaintThroughChildClassSettingProperty' => [
|
|
'<?php
|
|
class A {
|
|
public string $taint = "";
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
class B extends A {
|
|
public function __construct(string $taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
}
|
|
|
|
$b = new B($_GET["bar"]);
|
|
echo $b->getTaint();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'immutableClassTrackInputThroughMethod' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-immutable
|
|
*/
|
|
class A {
|
|
private string $taint = "";
|
|
|
|
public function __construct(string $taint) {
|
|
$this->taint = $taint;
|
|
}
|
|
|
|
public function getTaint() : string {
|
|
return $this->taint;
|
|
}
|
|
}
|
|
|
|
$a = new A($_GET["bar"]);
|
|
echo $a->getTaint();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'strTrReturnTypeTaint' => [
|
|
'<?php
|
|
$input = strtr(\'data\', $_GET[\'taint\'], \'data\');
|
|
setcookie($input, \'value\');',
|
|
'error_message' => 'TaintedCookie',
|
|
],
|
|
'conditionallyEscapedTaintPassedFalse' => [
|
|
'<?php
|
|
/**
|
|
* @psalm-taint-escape ($escape is true ? "html" : null)
|
|
*/
|
|
function foo(string $string, bool $escape = true): string {
|
|
if ($escape) {
|
|
$string = htmlspecialchars($string);
|
|
}
|
|
|
|
return $string;
|
|
}
|
|
|
|
echo foo($_GET["foo"], false);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'suppressOneCatchAnother' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
function data(array $data, string $key) {
|
|
return $data[$key];
|
|
}
|
|
|
|
function get(string $key) {
|
|
return data($_GET, $key);
|
|
}
|
|
|
|
function post(string $key) {
|
|
return data($_POST, $key);
|
|
}
|
|
|
|
echo get("x");
|
|
/** @psalm-suppress TaintedInput */
|
|
echo post("x");',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintSpecializedTwice' => [
|
|
'<?php
|
|
/** @psalm-taint-specialize */
|
|
function data(array $data, string $key) {
|
|
return $data[$key];
|
|
}
|
|
|
|
/** @psalm-taint-specialize */
|
|
function get(string $key) {
|
|
return data($_GET, $key);
|
|
}
|
|
|
|
echo get("x");',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'conditionallyEscapedTaintsAll' => [
|
|
'<?php
|
|
/** @psalm-taint-escape ($type is "int" ? "html" : null) */
|
|
function cast(mixed $value, string $type): mixed
|
|
{
|
|
if ("int" === $type) {
|
|
return (int) $value;
|
|
}
|
|
return (string) $value;
|
|
}
|
|
|
|
/** @psalm-taint-specialize */
|
|
function data(array $data, string $key, string $type) {
|
|
return cast($data[$key], $type);
|
|
}
|
|
|
|
// technically a false-positive, but desired behaviour in lieu
|
|
// of better information
|
|
echo data($_GET, "x", "int");',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'psalmFlowOnInstanceMethod' => [
|
|
'<?php //--taint-analysis
|
|
class Wdb {
|
|
/**
|
|
* @psalm-pure
|
|
*
|
|
* @param string $text
|
|
* @return string
|
|
* @psalm-flow ($text) -> return
|
|
*/
|
|
public function esc_like($text) {}
|
|
|
|
/**
|
|
* @param string $query
|
|
* @return int|bool
|
|
*
|
|
* @psalm-taint-sink sql $query
|
|
*/
|
|
public function query($query){}
|
|
}
|
|
|
|
$wdb = new Wdb();
|
|
|
|
$order = $wdb->esc_like($_GET["order"]);
|
|
$res = $wdb->query("SELECT blah FROM tablea ORDER BY ". $order. " DESC");',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'psalmFlowOnStaticMethod' => [
|
|
'<?php //--taint-analysis
|
|
class Wdb {
|
|
/**
|
|
* @psalm-pure
|
|
*
|
|
* @param string $text
|
|
* @return string
|
|
* @psalm-flow ($text) -> return
|
|
*/
|
|
public static function esc_like($text) {}
|
|
|
|
/**
|
|
* @param string $query
|
|
* @return int|bool
|
|
*
|
|
* @psalm-taint-sink sql $query
|
|
*/
|
|
public static function query($query){}
|
|
}
|
|
|
|
$order = Wdb::esc_like($_GET["order"]);
|
|
$res = Wdb::query("SELECT blah FROM tablea ORDER BY ". $order. " DESC");',
|
|
'error_message' => 'TaintedSql',
|
|
],
|
|
'keysAreTainted' => [
|
|
'<?php
|
|
function takesArray(array $arr): void {
|
|
foreach ($arr as $key => $_) {
|
|
echo $key;
|
|
}
|
|
}
|
|
|
|
takesArray([$_GET["bad"] => "good"]);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintArrayKeyWithExplicitSink' => [
|
|
'<?php
|
|
/** @psalm-taint-sink html $values */
|
|
function doTheMagic(array $values) {}
|
|
|
|
doTheMagic([(string)$_GET["bad"] => "foo"]);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
'taintThroughReset' => [
|
|
'<?php
|
|
function foo(array $arr) : void {
|
|
if ($arr) {
|
|
echo reset($arr);
|
|
}
|
|
}
|
|
|
|
foo([$_GET["a"]]);',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
/*
|
|
// TODO: Stubs do not support this type of inference even with $this->message = $message.
|
|
// Most uses of getMessage() would be with caught exceptions, so this is not representative of real code.
|
|
'taintException' => [
|
|
'<?php
|
|
$x = new Exception($_GET["x"]);
|
|
echo $x->getMessage();',
|
|
'error_message' => 'TaintedHtml',
|
|
],
|
|
*/
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @param string $code
|
|
* @param list<string> $expectedIssuesTypes
|
|
* @test
|
|
* @dataProvider multipleTaintIssuesAreDetectedDataProvider
|
|
*/
|
|
public function multipleTaintIssuesAreDetected(string $code, array $expectedIssuesTypes): void
|
|
{
|
|
if (\strpos($this->getTestName(), 'SKIPPED-') !== false) {
|
|
$this->markTestSkipped();
|
|
}
|
|
|
|
// disables issue exceptions - we need all, not just the first
|
|
$this->testConfig->throw_exception = false;
|
|
$filePath = self::$src_dir_path . 'somefile.php';
|
|
$this->addFile($filePath, $code);
|
|
$this->project_analyzer->trackTaintedInputs();
|
|
|
|
$this->analyzeFile($filePath, new Context(), false);
|
|
|
|
$actualIssueTypes = \array_map(
|
|
function (IssueData $issue): string {
|
|
return $issue->type . '{ ' . trim($issue->snippet) . ' }';
|
|
},
|
|
IssueBuffer::getIssuesDataForFile($filePath)
|
|
);
|
|
self::assertSame($expectedIssuesTypes, $actualIssueTypes);
|
|
}
|
|
|
|
/**
|
|
* @return array<string, array{0: string, expectedIssueTypes: list<string>}>
|
|
*/
|
|
public function multipleTaintIssuesAreDetectedDataProvider(): array
|
|
{
|
|
return [
|
|
'taintSinkFlow' => [
|
|
'<?php
|
|
/**
|
|
* @param string $value
|
|
* @return string
|
|
*
|
|
* @psalm-flow ($value) -> return
|
|
* @psalm-taint-sink html $value
|
|
*/
|
|
function process(string $value): string {}
|
|
$data = process((string)($_GET["inject"] ?? ""));
|
|
exec($data);
|
|
',
|
|
'expectedIssueTypes' => [
|
|
'TaintedHtml{ function process(string $value): string {} }',
|
|
'TaintedShell{ exec($data); }',
|
|
],
|
|
],
|
|
'taintSinkCascade' => [
|
|
'<?php
|
|
function triggerHtml(string $value): string
|
|
{
|
|
echo $value;
|
|
return $value;
|
|
}
|
|
function triggerShell(string $value): string
|
|
{
|
|
exec($value);
|
|
return $value;
|
|
}
|
|
function triggerFile(string $value): string
|
|
{
|
|
file_get_contents($value);
|
|
return $value;
|
|
}
|
|
$value = (string)($_GET["inject"] ?? "");
|
|
$value = triggerHtml($value);
|
|
$value = triggerShell($value);
|
|
$value = triggerFile($value);
|
|
',
|
|
'expectedIssueTypes' => [
|
|
'TaintedHtml{ echo $value; }',
|
|
'TaintedTextWithQuotes{ echo $value; }',
|
|
'TaintedShell{ exec($value); }',
|
|
'TaintedFile{ file_get_contents($value); }',
|
|
],
|
|
],
|
|
'taintedIncludes' => [
|
|
'<?php
|
|
$first = (string)($_GET["first"] ?? "");
|
|
$second = (string)($_GET["second"] ?? "");
|
|
require $first;
|
|
require dirname(__DIR__)."/first.php";
|
|
require $second;
|
|
require dirname(__DIR__)."/second.php";
|
|
',
|
|
'expectedIssueTypes' => [
|
|
'TaintedInclude{ require $first; }',
|
|
'TaintedInclude{ require $second; }',
|
|
],
|
|
],
|
|
];
|
|
}
|
|
}
|