Viewing file: Core.php (28.91 KB) -rwxr-x--- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
declare(strict_types=1);
namespace PhpMyAdmin;
use PhpMyAdmin\Http\ServerRequest; use Symfony\Component\Config\FileLocator; use Symfony\Component\DependencyInjection\ContainerBuilder; use Symfony\Component\DependencyInjection\Loader\PhpFileLoader;
use function __; use function array_keys; use function array_pop; use function array_walk_recursive; use function chr; use function count; use function defined; use function explode; use function filter_var; use function function_exists; use function getenv; use function gmdate; use function hash_equals; use function hash_hmac; use function header; use function header_remove; use function htmlspecialchars; use function http_build_query; use function in_array; use function intval; use function is_array; use function is_string; use function json_decode; use function json_encode; use function mb_strlen; use function mb_strpos; use function mb_substr; use function parse_str; use function parse_url; use function preg_match; use function preg_replace; use function session_write_close; use function sprintf; use function str_replace; use function strlen; use function strpos; use function strtolower; use function strtr; use function substr; use function trigger_error; use function unserialize; use function urldecode; use function vsprintf;
use const DATE_RFC1123; use const E_USER_ERROR; use const E_USER_WARNING; use const FILTER_VALIDATE_IP;
/** * Core functions used all over the scripts. */ class Core { /** * Removes insecure parts in a path; used before include() or * require() when a part of the path comes from an insecure source * like a cookie or form. * * @param string $path The path to check */ public static function securePath(string $path): string { // change .. to . return (string) preg_replace('@\.\.*@', '.', $path); }
/** * displays the given error message on phpMyAdmin error page in foreign language, * ends script execution and closes session * * loads language file if not loaded already * * @param string $error_message the error message or named error message * @param string|array $message_args arguments applied to $error_message */ public static function fatalError( string $error_message, $message_args = null ): void { global $dbi;
/* Use format string if applicable */ if (is_string($message_args)) { $error_message = sprintf($error_message, $message_args); } elseif (is_array($message_args)) { $error_message = vsprintf($error_message, $message_args); }
/* * Avoid using Response class as config does not have to be loaded yet * (this can happen on early fatal error) */ if ( isset($dbi, $GLOBALS['config']) && $GLOBALS['config']->get('is_setup') === false && ResponseRenderer::getInstance()->isAjax() ) { $response = ResponseRenderer::getInstance(); $response->setRequestStatus(false); $response->addJSON('message', Message::error($error_message));
if (! defined('TESTSUITE')) { exit; }
return; }
if (! empty($_REQUEST['ajax_request'])) { // Generate JSON manually self::headerJSON(); echo json_encode( [ 'success' => false, 'message' => Message::error($error_message)->getDisplay(), ] );
if (! defined('TESTSUITE')) { exit; }
return; }
$error_message = strtr($error_message, ['<br>' => '[br]']); $template = new Template();
echo $template->render('error/generic', [ 'lang' => $GLOBALS['lang'] ?? 'en', 'dir' => $GLOBALS['text_dir'] ?? 'ltr', 'error_message' => Sanitize::sanitizeMessage($error_message), ]);
if (! defined('TESTSUITE')) { exit; } }
/** * Returns a link to the PHP documentation * * @param string $target anchor in documentation * * @return string the URL */ public static function getPHPDocLink(string $target): string { /* List of PHP documentation translations */ $php_doc_languages = [ 'pt_BR', 'zh_CN', 'fr', 'de', 'ja', 'ru', 'es', 'tr', ];
$lang = 'en'; if (isset($GLOBALS['lang']) && in_array($GLOBALS['lang'], $php_doc_languages)) { if ($GLOBALS['lang'] === 'zh_CN') { $lang = 'zh'; } else { $lang = $GLOBALS['lang']; } }
return self::linkURL('https://www.php.net/manual/' . $lang . '/' . $target); }
/** * Warn or fail on missing extension. * * @param string $extension Extension name * @param bool $fatal Whether the error is fatal. * @param string $extra Extra string to append to message. */ public static function warnMissingExtension( string $extension, bool $fatal = false, string $extra = '' ): void { global $errorHandler;
$message = 'The %s extension is missing. Please check your PHP configuration.';
/* Gettext does not have to be loaded yet here */ if (function_exists('__')) { $message = __('The %s extension is missing. Please check your PHP configuration.'); }
$doclink = self::getPHPDocLink('book.' . $extension . '.php'); $message = sprintf($message, '[a@' . $doclink . '@Documentation][em]' . $extension . '[/em][/a]'); if ($extra != '') { $message .= ' ' . $extra; }
if ($fatal) { self::fatalError($message);
return; }
$errorHandler->addError($message, E_USER_WARNING, '', 0, false); }
/** * returns count of tables in given db * * @param string $db database to count tables for * * @return int count of tables in $db */ public static function getTableCount(string $db): int { global $dbi;
$tables = $dbi->tryQuery('SHOW TABLES FROM ' . Util::backquote($db) . ';');
if ($tables) { return $tables->numRows(); }
return 0; }
/** * Converts numbers like 10M into bytes * Used with permission from Moodle (https://moodle.org) by Martin Dougiamas * (renamed with PMA prefix to avoid double definition when embedded * in Moodle) * * @param string|int $size size (Default = 0) */ public static function getRealSize($size = 0): int { if (! $size) { return 0; }
$binaryprefixes = [ 'T' => 1099511627776, 't' => 1099511627776, 'G' => 1073741824, 'g' => 1073741824, 'M' => 1048576, 'm' => 1048576, 'K' => 1024, 'k' => 1024, ];
if (preg_match('/^([0-9]+)([KMGT])/i', (string) $size, $matches)) { return (int) ($matches[1] * $binaryprefixes[$matches[2]]); }
return (int) $size; }
/** * Checks given $page against given $allowList and returns true if valid * it optionally ignores query parameters in $page (script.php?ignored) * * @param string $page page to check * @param array $allowList allow list to check page against * @param bool $include whether the page is going to be included */ public static function checkPageValidity(&$page, array $allowList = [], $include = false): bool { if (empty($allowList)) { $allowList = ['index.php']; }
if (empty($page)) { return false; }
if (in_array($page, $allowList)) { return true; }
if ($include) { return false; }
$_page = mb_substr( $page, 0, (int) mb_strpos($page . '?', '?') ); if (in_array($_page, $allowList)) { return true; }
$_page = urldecode($page); $_page = mb_substr( $_page, 0, (int) mb_strpos($_page . '?', '?') );
return in_array($_page, $allowList); }
/** * tries to find the value for the given environment variable name * * searches in $_SERVER, $_ENV then tries getenv() and apache_getenv() * in this order * * @param string $var_name variable name * * @return string value of $var or empty string */ public static function getenv(string $var_name): string { if (isset($_SERVER[$var_name])) { return (string) $_SERVER[$var_name]; }
if (isset($_ENV[$var_name])) { return (string) $_ENV[$var_name]; }
if (getenv($var_name)) { return (string) getenv($var_name); }
if (function_exists('apache_getenv') && apache_getenv($var_name, true)) { return (string) apache_getenv($var_name, true); }
return ''; }
/** * Send HTTP header, taking IIS limits into account (600 seems ok) * * @param string $uri the header to send * @param bool $use_refresh whether to use Refresh: header when running on IIS */ public static function sendHeaderLocation(string $uri, bool $use_refresh = false): void { if ($GLOBALS['config']->get('PMA_IS_IIS') && mb_strlen($uri) > 600) { ResponseRenderer::getInstance()->disable();
$template = new Template(); echo $template->render('header_location', ['uri' => $uri]);
return; }
/* * Avoid relative path redirect problems in case user entered URL * like /phpmyadmin/index.php/ which some web servers happily accept. */ if ($uri[0] === '.') { $uri = $GLOBALS['config']->getRootPath() . substr($uri, 2); }
$response = ResponseRenderer::getInstance();
session_write_close(); if ($response->headersSent()) { trigger_error('Core::sendHeaderLocation called when headers are already sent!', E_USER_ERROR); }
// bug #1523784: IE6 does not like 'Refresh: 0', it // results in a blank page // but we need it when coming from the cookie login panel) if ($GLOBALS['config']->get('PMA_IS_IIS') && $use_refresh) { $response->header('Refresh: 0; ' . $uri);
return; }
$response->header('Location: ' . $uri); }
/** * Outputs application/json headers. This includes no caching. */ public static function headerJSON(): void { if (defined('TESTSUITE')) { return; }
// No caching $headers = self::getNoCacheHeaders();
// Media type $headers['Content-Type'] = 'application/json; charset=UTF-8';
/** * Disable content sniffing in browser. * This is needed in case we include HTML in JSON, browser might assume it's html to display. */ $headers['X-Content-Type-Options'] = 'nosniff';
foreach ($headers as $name => $value) { header(sprintf('%s: %s', $name, $value)); } }
/** * Outputs headers to prevent caching in browser (and on the way). */ public static function noCacheHeader(): void { if (defined('TESTSUITE')) { return; }
$headers = self::getNoCacheHeaders();
foreach ($headers as $name => $value) { header(sprintf('%s: %s', $name, $value)); } }
/** * @return array<string, string> */ public static function getNoCacheHeaders(): array { $headers = []; $date = (string) gmdate(DATE_RFC1123);
// rfc2616 - Section 14.21 $headers['Expires'] = $date;
// HTTP/1.1 $headers['Cache-Control'] = 'no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0';
// HTTP/1.0 $headers['Pragma'] = 'no-cache';
// test case: exporting a database into a .gz file with Safari // would produce files not having the current time // (added this header for Safari but should not harm other browsers) $headers['Last-Modified'] = $date;
return $headers; }
/** * Sends header indicating file download. * * @param string $filename Filename to include in headers if empty, * none Content-Disposition header will be sent. * @param string $mimetype MIME type to include in headers. * @param int $length Length of content (optional) * @param bool $no_cache Whether to include no-caching headers. */ public static function downloadHeader( string $filename, string $mimetype, int $length = 0, bool $no_cache = true ): void { $headers = [];
if ($no_cache) { $headers = self::getNoCacheHeaders(); }
/* Replace all possibly dangerous chars in filename */ $filename = Sanitize::sanitizeFilename($filename); if (! empty($filename)) { $headers['Content-Description'] = 'File Transfer'; $headers['Content-Disposition'] = 'attachment; filename="' . $filename . '"'; }
$headers['Content-Type'] = $mimetype;
// The default output in PMA uses gzip, // so if we want to output uncompressed file, we should reset the encoding. // See PHP bug https://github.com/php/php-src/issues/8218 header_remove('Content-Encoding');
$headers['Content-Transfer-Encoding'] = 'binary';
if ($length > 0) { $headers['Content-Length'] = (string) $length; }
foreach ($headers as $name => $value) { header(sprintf('%s: %s', $name, $value)); } }
/** * Returns value of an element in $array given by $path. * $path is a string describing position of an element in an associative array, * eg. Servers/1/host refers to $array[Servers][1][host] * * @param string $path path in the array * @param array $array the array * @param mixed $default default value * * @return array|mixed|null array element or $default */ public static function arrayRead(string $path, array $array, $default = null) { $keys = explode('/', $path); $value =& $array; foreach ($keys as $key) { if (! isset($value[$key])) { return $default; }
$value =& $value[$key]; }
return $value; }
/** * Stores value in an array * * @param string $path path in the array * @param array $array the array * @param mixed $value value to store */ public static function arrayWrite(string $path, array &$array, $value): void { $keys = explode('/', $path); $last_key = array_pop($keys); $a =& $array; foreach ($keys as $key) { if (! isset($a[$key])) { $a[$key] = []; }
$a =& $a[$key]; }
$a[$last_key] = $value; }
/** * Removes value from an array * * @param string $path path in the array * @param array $array the array */ public static function arrayRemove(string $path, array &$array): void { $keys = explode('/', $path); $keys_last = array_pop($keys); $path = []; $depth = 0;
$path[0] =& $array; $found = true; // go as deep as required or possible foreach ($keys as $key) { if (! isset($path[$depth][$key])) { $found = false; break; }
$depth++; $path[$depth] =& $path[$depth - 1][$key]; }
// if element found, remove it if ($found) { unset($path[$depth][$keys_last]); $depth--; }
// remove empty nested arrays for (; $depth >= 0; $depth--) { if (isset($path[$depth + 1]) && count($path[$depth + 1]) !== 0) { break; }
unset($path[$depth][$keys[$depth]]); } }
/** * Returns link to (possibly) external site using defined redirector. * * @param string $url URL where to go. * * @return string URL for a link. */ public static function linkURL(string $url): string { if (! preg_match('#^https?://#', $url)) { return $url; }
$params = []; $params['url'] = $url;
$url = Url::getCommon($params); //strip off token and such sensitive information. Just keep url. $arr = parse_url($url);
if (! is_array($arr)) { $arr = []; }
parse_str($arr['query'] ?? '', $vars); $query = http_build_query(['url' => $vars['url']]);
if ($GLOBALS['config'] !== null && $GLOBALS['config']->get('is_setup')) { return '../url.php?' . $query; }
return './url.php?' . $query; }
/** * Checks whether domain of URL is an allowed domain or not. * Use only for URLs of external sites. * * @param string $url URL of external site. */ public static function isAllowedDomain(string $url): bool { $arr = parse_url($url);
if (! is_array($arr)) { $arr = []; }
// We need host to be set if (! isset($arr['host']) || strlen($arr['host']) == 0) { return false; }
// We do not want these to be present $blocked = [ 'user', 'pass', 'port', ]; foreach ($blocked as $part) { if (isset($arr[$part]) && strlen((string) $arr[$part]) != 0) { return false; } }
$domain = $arr['host']; $domainAllowList = [ /* Include current domain */ $_SERVER['SERVER_NAME'], /* phpMyAdmin domains */ 'wiki.phpmyadmin.net', 'www.phpmyadmin.net', 'phpmyadmin.net', 'demo.phpmyadmin.net', 'docs.phpmyadmin.net', /* mysql.com domains */ 'dev.mysql.com', 'bugs.mysql.com', /* mariadb domains */ 'mariadb.org', 'mariadb.com', /* php.net domains */ 'php.net', 'www.php.net', /* Github domains*/ 'github.com', 'www.github.com', /* Percona domains */ 'www.percona.com', /* Following are doubtful ones. */ 'mysqldatabaseadministration.blogspot.com', ];
return in_array($domain, $domainAllowList); }
/** * Replace some html-unfriendly stuff * * @param string $buffer String to process * * @return string Escaped and cleaned up text suitable for html */ public static function mimeDefaultFunction(string $buffer): string { $buffer = htmlspecialchars($buffer); $buffer = str_replace(' ', ' ', $buffer);
return (string) preg_replace("@((\015\012)|(\015)|(\012))@", '<br>' . "\n", $buffer); }
/** * Displays SQL query before executing. * * @param array|string $query_data Array containing queries or query itself */ public static function previewSQL($query_data): void { $retval = '<div class="preview_sql">'; if (empty($query_data)) { $retval .= __('No change'); } elseif (is_array($query_data)) { foreach ($query_data as $query) { $retval .= Html\Generator::formatSql($query); } } else { $retval .= Html\Generator::formatSql($query_data); }
$retval .= '</div>'; $response = ResponseRenderer::getInstance(); $response->addJSON('sql_data', $retval); }
/** * recursively check if variable is empty * * @param mixed $value the variable */ public static function emptyRecursive($value): bool { if (is_array($value)) { $empty = true; array_walk_recursive( $value, /** * @param mixed $item */ static function ($item) use (&$empty): void { $empty = $empty && empty($item); } );
return $empty; }
return empty($value); }
/** * Creates some globals from $_POST variables matching a pattern * * @param array $post_patterns The patterns to search for */ public static function setPostAsGlobal(array $post_patterns): void { global $containerBuilder;
foreach (array_keys($_POST) as $post_key) { foreach ($post_patterns as $one_post_pattern) { if (! preg_match($one_post_pattern, $post_key)) { continue; }
$GLOBALS[$post_key] = $_POST[$post_key]; $containerBuilder->setParameter($post_key, $GLOBALS[$post_key]); } } }
/** * Gets the "true" IP address of the current user * * @return string|bool the ip of the user */ public static function getIp() { /* Get the address of user */ if (empty($_SERVER['REMOTE_ADDR'])) { /* We do not know remote IP */ return false; }
$direct_ip = $_SERVER['REMOTE_ADDR'];
/* Do we trust this IP as a proxy? If yes we will use it's header. */ if (! isset($GLOBALS['cfg']['TrustedProxies'][$direct_ip])) { /* Return true IP */ return $direct_ip; }
/** * Parse header in form: * X-Forwarded-For: client, proxy1, proxy2 */ // Get header content $value = self::getenv($GLOBALS['cfg']['TrustedProxies'][$direct_ip]); // Grab first element what is client adddress $value = explode(',', $value)[0]; // checks that the header contains only one IP address, $is_ip = filter_var($value, FILTER_VALIDATE_IP);
if ($is_ip !== false) { // True IP behind a proxy return $value; }
// We could not parse header return false; }
/** * Sanitizes MySQL hostname * * * strips p: prefix(es) * * @param string $name User given hostname */ public static function sanitizeMySQLHost(string $name): string { while (strtolower(substr($name, 0, 2)) === 'p:') { $name = substr($name, 2); }
return $name; }
/** * Sanitizes MySQL username * * * strips part behind null byte * * @param string $name User given username */ public static function sanitizeMySQLUser(string $name): string { $position = strpos($name, chr(0)); if ($position !== false) { return substr($name, 0, $position); }
return $name; }
/** * Safe unserializer wrapper * * It does not unserialize data containing objects * * @param string $data Data to unserialize * * @return mixed|null */ public static function safeUnserialize(string $data) { /* validate serialized data */ $length = strlen($data); $depth = 0; for ($i = 0; $i < $length; $i++) { $value = $data[$i];
switch ($value) { case '}': /* end of array */ if ($depth <= 0) { return null; }
$depth--; break; case 's': /* string */ // parse sting length $strlen = intval(substr($data, $i + 2)); // string start $i = strpos($data, ':', $i + 2); if ($i === false) { return null; }
// skip string, quotes and ; $i += 2 + $strlen + 1; if ($data[$i] !== ';') { return null; }
break;
case 'b': case 'i': case 'd': /* bool, integer or double */ // skip value to separator $i = strpos($data, ';', $i); if ($i === false) { return null; }
break; case 'a': /* array */ // find array start $i = strpos($data, '{', $i); if ($i === false) { return null; }
// remember nesting $depth++; break; case 'N': /* null */ // skip to end $i = strpos($data, ';', $i); if ($i === false) { return null; }
break; default: /* any other elements are not wanted */ return null; } }
// check unterminated arrays if ($depth > 0) { return null; }
return unserialize($data); }
/** * Sign the sql query using hmac using the session token * * @param string $sqlQuery The sql query * * @return string */ public static function signSqlQuery($sqlQuery) { global $cfg;
$secret = $_SESSION[' HMAC_secret '] ?? '';
return hash_hmac('sha256', $sqlQuery, $secret . $cfg['blowfish_secret']); }
/** * Check that the sql query has a valid hmac signature * * @param string $sqlQuery The sql query * @param string $signature The Signature to check */ public static function checkSqlQuerySignature($sqlQuery, $signature): bool { global $cfg;
$secret = $_SESSION[' HMAC_secret '] ?? ''; $hmac = hash_hmac('sha256', $sqlQuery, $secret . $cfg['blowfish_secret']);
return hash_equals($hmac, $signature); }
/** * Get the container builder */ public static function getContainerBuilder(): ContainerBuilder { $containerBuilder = new ContainerBuilder(); $loader = new PhpFileLoader($containerBuilder, new FileLocator(ROOT_PATH . 'libraries')); $loader->load('services_loader.php');
return $containerBuilder; }
public static function populateRequestWithEncryptedQueryParams(ServerRequest $request): ServerRequest { $queryParams = $request->getQueryParams(); $parsedBody = $request->getParsedBody();
unset($_GET['eq'], $_POST['eq'], $_REQUEST['eq']);
if (! isset($queryParams['eq']) && (! is_array($parsedBody) || ! isset($parsedBody['eq']))) { return $request; }
$encryptedQuery = ''; if ( is_array($parsedBody) && isset($parsedBody['eq']) && is_string($parsedBody['eq']) && $parsedBody['eq'] !== '' ) { $encryptedQuery = $parsedBody['eq']; unset($parsedBody['eq'], $queryParams['eq']); } elseif (isset($queryParams['eq']) && is_string($queryParams['eq']) && $queryParams['eq'] !== '') { $encryptedQuery = $queryParams['eq']; unset($queryParams['eq']); }
$decryptedQuery = null; if ($encryptedQuery !== '') { $decryptedQuery = Url::decryptQuery($encryptedQuery); }
if ($decryptedQuery === null) { $request = $request->withQueryParams($queryParams); if (is_array($parsedBody)) { $request = $request->withParsedBody($parsedBody); }
return $request; }
$urlQueryParams = (array) json_decode($decryptedQuery); foreach ($urlQueryParams as $urlQueryParamKey => $urlQueryParamValue) { if (is_array($parsedBody)) { $parsedBody[$urlQueryParamKey] = $urlQueryParamValue; $_POST[$urlQueryParamKey] = $urlQueryParamValue; } else { $queryParams[$urlQueryParamKey] = $urlQueryParamValue; $_GET[$urlQueryParamKey] = $urlQueryParamValue; }
$_REQUEST[$urlQueryParamKey] = $urlQueryParamValue; }
$request = $request->withQueryParams($queryParams); if (is_array($parsedBody)) { $request = $request->withParsedBody($parsedBody); }
return $request; } }
|