PHP Security-File Upload Attack
File Upload Attack
Sometimes in addition to standard form data, you also need to allow users to upload files. Since files are transferred in a form differently than other form data, you must specify a special encoding multipart/form-data:
CODE:
<form action="upload.php" method="POST" enctype="multipart/form-data">
A form with both ordinary form data and files is a special format, and specifying the encoding method allows the browser to process it according to the requirements of the format .
The form element that allows users to select files and upload them is very simple:
CODE:
<input type="file" name="attachment" />
The appearance of this element varies in various browsers. Traditionally, the interface includes a standard text box and a browse button, so that the user can directly enter the path of the file manually or select it through browsing. In Safari browser there is only browse button. Fortunately, their functions and behaviors are the same.
To better demonstrate the file upload mechanism, the following is an example that allows users to upload attachments:
CODE:
<form action="upload.php" method="POST" enctype="multipart/form-data">Please choose a file to upload:
The hidden form variable MAX_FILE_SIZE tells the browser the maximum allowed upload file size. Like many client restrictions, this one can be easily bypassed by an attacker, but it provides guidance for legitimate users. This restriction is only reliable if done on the server.
Among the PHP configuration variables, upload_max_filesize controls the maximum file size allowed to be uploaded. At the same time, post_max_size (the maximum submitted data size of the POST form) can also potentially be controlled, because the file is uploaded through the form data.
The receiving program upload.php displays the contents of the super global array $_FILES:
CODE:
<?php header('Content-Type: text/plain'); print_r($_FILES); ?>
In order to understand the upload process, we use a file named author.txt for testing. Here is its content:
CODE:
Chris Shiflett http://www.php.cn/
When you upload this file to the upload.php program, you can see output similar to the following in the browser:
CODE:
Array ( [attachment] => Array ( [name] => author.txt [type] => text/plain [tmp_name] => /tmp/phpShfltt [error] => 0 [size] => 36 ) )
## Although it can be seen from the above that PHP is actually super global The content provided in the array $_FILES, but it cannot give the original information of the form data. As a security-focused developer who needs to identify input to know what the browser is actually sending, it’s worth taking a look at the following HTTP request information:
CODE:
POST /upload.php HTTP/1.1 Host: example.org Content-Type: multipart/form-data; boundary=----------12345 Content-Length: 245 ----------12345 Content-Disposition: form-data; name="attachment"; filename="author.txt" Content-Type: text/plain Chris Shiflett http://www.php.cn/ ----------12345 Content-Disposition: form-data; name="MAX_FILE_SIZE" 1024 ----------12345--
Since PHP saves the uploaded file in the temporary file area of the file system (/tmp/phpShfltt in this example), the usual operation is to move it to other places for saving and reading it into memory. There is a theoretical risk if you don't check tmp_name to make sure it's an uploaded file (and not something like /etc/passwd). It is called a theoretical risk because there is no known attack method that allows an attacker to modify the value of tmp_name. However, just because there are no means of attack doesn’t mean you don’t need to take some simple security measures. New attacks appear every day, and one simple step can protect your system.
PHP provides two convenient functions to mitigate these theoretical risks: is_uploaded_file() and move_uploaded_file( ). If you need to ensure that the file in tmp_name is an uploaded file, you can use is_uploaded_file():
CODE:
<?php
$filename = $_FILES['attachment']['tmp_name'];
if (is_uploaded_file($filename))
{
/* $_FILES['attachment']['tmp_name'] is an
uploaded file. */
}
?>
如果你希望只把上传的文件移到一个固定位置,你可以使用move_uploaded_file( ):
CODE:
<?php $old_filename = $_FILES['attachment']['tmp_name']; $new_filename = '/path/to/attachment.txt'; if (move_uploaded_file($old_filename, $new_filename)) { /* $old_filename is an uploaded file, and the move was successful. */ } ?>
最后你可以用 filesize( ) 来校验文件的大小:
CODE:
<?php $filename = $_FILES['attachment']['tmp_name']; if (is_uploaded_file($filename)) { $size = filesize($filename); } ?>
这些安全措施的目的是加上一层额外的安全保护层。最佳的方法是永远尽可能少地去信任。
以上就是PHP安全-文件上传攻击的内容,更多相关内容请关注PHP中文网(www.php.cn)!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
