


A brief analysis of the latest SQL injection vulnerability in PHP framework Laravel
Laravel, the well-known PHP development framework, previously reported a high-risk SQL injection vulnerability on the official blog. Here is a brief analysis.
First of all, this vulnerability belongs to the irregular coding of the website. The official gave a hint:
But the official still did it It has been patched and can be fixed by upgrading to the latest version V5.8.7.
Let’s first locate here:
Illuminate\Validation\Rule
The officially recommended writing method is:
Rule::unique('users')->ignore($id),
If the website coding does not process the value of $id in advance, the user can pass it directly Giving malicious data to the ignore function will cause SQL injection.
Let’s follow the function:
\Illuminate\Validation\Rules\Unique.php class Unique { ... public function ignore($id, $idColumn = null) { if ($id instanceof Model) { return $this->ignoreModel($id, $idColumn); } $this->ignore = $id; $this->idColumn = $idColumn ?? 'id'; return $this; }
Here we do not consider writing $id as an instance. If $id is user-controllable, $idColumn can be written directly as empty, and finally assigned The situation is as follows:
$this->ignore = $id; $this->idColumn = 'id';
If the website code is structured like this, the value entered by the hacker is controllable:
$id = $request->input('id');
Finally we will get here:
Illuminate\Validation\Rules\Unique.php public function __toString() { ... ... }
We Take a look at the key code changes:
Illuminate\Validation\Rules\Unique.php V5.8.7【最新版】 public function __toString() { $this->ignore ? '"'.addslashes($this->ignore).'"' : 'NULL', } Illuminate\Validation\Rules\Unique.php V5.8.4 public function __toString() { $this->ignore ? '"'.$this->ignore.'"' : 'NULL', }
The latest code here is v5.8.7, which directly gives $this->ignore to addslashes. There was no protection here before.
What’s interesting is that the author compared the diffs, during which the official also tried to filter other quoted places. Finally, unified filtering was performed at __toString.
Finally, the following code will enter DatabaseRule for subsequent SQL rule matching.
Illuminate\Validation\Rules\DatabaseRule.php
There was no further processing after this, and then SQL injection was formed.
For more Laravel related technical articles, please visit the Laravel Framework Getting Started Tutorial column to learn!
The above is the detailed content of A brief analysis of the latest SQL injection vulnerability in PHP framework Laravel. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Method for obtaining the return code when Laravel email sending fails. When using Laravel to develop applications, you often encounter situations where you need to send verification codes. And in reality...

The method of handling Laravel's email failure to send verification code is to use Laravel...

Laravel schedule task run unresponsive troubleshooting When using Laravel's schedule task scheduling, many developers will encounter this problem: schedule:run...

How to implement the table function of custom click to add data in dcatadmin (laravel-admin) When using dcat...

The impact of sharing of Redis connections in Laravel framework and select methods When using Laravel framework and Redis, developers may encounter a problem: through configuration...

Custom tenant database connection in Laravel multi-tenant extension package stancl/tenancy When building multi-tenant applications using Laravel multi-tenant extension package stancl/tenancy,...

LaravelEloquent Model Retrieval: Easily obtaining database data EloquentORM provides a concise and easy-to-understand way to operate the database. This article will introduce various Eloquent model search techniques in detail to help you obtain data from the database efficiently. 1. Get all records. Use the all() method to get all records in the database table: useApp\Models\Post;$posts=Post::all(); This will return a collection. You can access data using foreach loop or other collection methods: foreach($postsas$post){echo$post->

A problem of duplicate class definition during Laravel database migration occurs. When using the Laravel framework for database migration, developers may encounter "classes have been used...
