5546-CakePHP-tutorial-no-3-from-IBM.pdf

(229 KB) Pobierz
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
03/06/2007 08:15 PM
Cook up Web sites fast with CakePHP, Part 3: Use
Sanitize for your protection
How to lock down your CakePHP applications with Sanitize and Security
Level: Intermediate
Duane O'Brien ( d@duaneobrien.com ), PHP developer, Freelance
19 Dec 2006
CakePHP is a stable production-ready, rapid-development aid for building Web sites in PHP.
This " Cook up Web sites fast with CakePHP " series shows you how to build an online product
catalog using CakePHP. Part 1 focuses on getting CakePHP up and running, and Part 2
demonstrates how to use scaffolding and Bake. In this article, you will learn how to use
CakePHP's Sanitize and Security components to help secure your user-submitted data. You will
also learn how to handle invalid requests.
Introduction
This series is designed for PHP developers who want to start using CakePHP to make their lives easier. In the
end, you will have learned how to install and configure CakePHP, the basics of Model-View-Controller
(MVC) design, how to validate user data in CakePHP, how to use CakePHP Helpers, and how to get an
application up and running quickly using CakePHP. It might sound like a lot to learn, but don't worry --
CakePHP does most of it for you.
This article assumes you have already completed Part 1 and Part 2 , and that you still have the working
environment you set up for those tutorials. If you do not have CakePHP installed, you should run through Parts
1 and 2 before continuing.
It is assumed that you are familiar with the PHP programming language, have a fundamental grasp of database
design, and are comfortable getting your hands dirty.
System requirements
Before you begin, you need to have an environment in which you can work. CakePHP has reasonably minimal
server requirements:
1 An HTTP server that supports sessions (and preferably mod_rewrite ). This tutorial was written
using Apache V1.3 with mod_rewrite enabled.
2 PHP V4.3.2 or later (including PHP V5). This tutorial was written using PHP V5.0.4
.
3 A supported database engine (currently MySQL, PostgreSQL or using a wrapper around ADODB). This
tutorial was written using MySQL V4.1.15.
You'll also need a database ready for your application to use. The tutorial will provide syntax for creating any
necessary tables in MySQL.
The simplest way to download CakePHP is to visit CakeForge.org and download the latest stable version. This
tutorial was written using V1.1.8. (Nightly builds and copies straight from Subversion are also available.
Details are in the CakePHP Manual (see Resources ).)
http://www-128.ibm.com/developerworks/opensource/library/os-php-cake3/
Page 1 of 11
.
.
332049119.010.png 332049119.011.png
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
03/06/2007 08:15 PM
Tor, so far
At the end of Part 2 , you were given another opportunity to put your skills to work by enhancing Tor . You
were to use Bake to generate views and a controller for dealers, then verify that the dealer name is unique, fix
a bug in the products ACLs, and change the products view to only show Edit and Delete buttons for the users
who can use them. It was a long to-do list. How did you do?
The login view
Baking the dealers controller and views should have been straightforward. From your CakePHP installation
directory, you would have run php cake/scripts/bake.php .
To generate the controller, you would have entered C in the first menu and specified the controller name
dealers . To generate the views, you would have entered V in the first menu and specified the controller
name dealers . These steps were virtually identical to the steps you followed to create the products
controller and views.
You also had to alter the add action in the dealers controller to verify that a dealer with the submitted dealer
name didn't exist. You might have done so with something like the following:
Listing 1. Altering the add action in dealers
if ($this->Dealer->findByTitle($this->data['Dealer']['title']))
{
$this->Dealer->invalidate('title');
$this->set('title_error', 'A dealer with that title already exists.');
} else {
...
}
This would have also required the setting and usage of a title_error variable in the add view for the
dealer, much like you did for the user add view.
Add product bug fix
Another one of your tasks was to fix a bug in the products add method. As the method was left at the
end of Part 2 , anyone could add a product, even if logged out. There are several ways to fix this.
Using access control lists (ACLs), you could have created an action in the products controller and used it to
grant create access to the users access request object (ARO) on each dealer access control object (ACO). You
then would have deleted the action since you didn't need it anymore. Next, you could have modified the
dealer add action to grant create permissions for the dealer ACO to the user's ARO. Finally, in the
products add method, you could have checked to make sure the user had permissions. Or you could
have done something like that shown below.
Listing 2. Checking if a user is logged in on users index action
function add() {
$username = $this->Session->read('user');
if ($username)
{
... the rest of your add function goes here
} else {
$this->redirect('/users/login');
}
http://www-128.ibm.com/developerworks/opensource/library/os-php-cake3/
Page 2 of 11
332049119.012.png
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
03/06/2007 08:15 PM
}
Look familiar? It should. It's the same check you use to see if a user was logged in on the users index action.
If the user is logged in, he is obviously a user. It's something of a trick solution, but it does show you that
there's more than one way to skin a user.
Dealer ACLs
As it stands, the dealer actions are completely unprotected. Again, these should be modified so that only users
can actually use them, but ACLs that are more stringent could and should be applied, though full coverage of
this is too big to cover here. Consider something like this:
Any user can add or view a dealer.
Only the user who created a dealer can modify or delete the dealer.
This could be worked into the application further, such as:
If a user has created a dealer, he can add another user to the dealership.
Any user in a dealership can modify any product created for dealership.
There are many other ways this could be done. Experiment with a few. Don't be afraid to get your hands dirty.
Products view enhancements
The last thing you needed to do was modify the products views so that Edit and Delete buttons are only
shown to the users who can edit or delete the product. Probably the easiest way to do this would be to remove
the Edit and Delete buttons from the index view completely. You could just as easily check each product for
the user's rights and show or hide the buttons, but the performance might not be what you want.
Then in the view action, you could check to see if the user has permission to update or delete the product and
set variables that can be used to display or hide the buttons in the view. In the view action in the controller,
you should have something like that shown below.
Listing 3. Possible view action solution
if ($this->Acl->check($this->Session->read('user'), $id.'-'.$product['Product']['title'],
'update'))
{
$this->set('showUpdate', TRUE);
} else {
$this->set('showUpdate', FALSE);
}
if ($this->Acl->check($this->Session->read('user'),
$id.'-'.$product['Product']['title'],
'delete'))
{
$this->set('showDelete', TRUE);
} else {
$this->set('showDelete', FALSE);
}
And in products/view.thtml, you need something like what is shown here:
Listing 4. Possible products/view.thtml solution
<li><?php if ($showUpdate) { echo $html->link('Edit Product', '/products/edit/' .
$product['Product']['id']); } ?> </li>
<li><?php if ($showDelete) { echo $html->link('Delete Product', '/products/delete/'
. $product['Product']['id'], null, 'Are you sure you want to delete: id ' .
$product['Product']['id'] . '?'); } ?> </li>
http://www-128.ibm.com/developerworks/opensource/library/os-php-cake3/
Page 3 of 11
332049119.013.png
 
332049119.001.png 332049119.002.png 332049119.003.png
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
03/06/2007 08:15 PM
Again, don't worry if your solutions don't exactly match these solutions. They are intended to be examples, not
Dogma. You can download the code thus far to get on the same page.
Data security
When dealing with a Web application, the importance of data security cannot be overstated. At the risk of
sounding like a credit security commercial, you have to be constantly on your guard against hackers, crackers,
script kiddies, identity thieves, spammers, phishers, criminals, and just plain old bad people. Yet while it has
been this way for years, data security is still frequently treated lightly. It doesn't matter if you write the most
beautiful and elegant Web application in the history of mankind. Bad data security will bring your application
to its knees. To understand how to deal with bad data, you should get familiar with some of the basic problems
you face.
What it means to secure your data
Despite bad data security causing so much trouble, the whole problem can be summarized in five words: know
what you are getting. Data security does not mean stripping out all HTML -- though you may want to. Nor
does it mean stripping out any special characters -- though you may want to. The fundamental principle is that
your application knows what it is getting.
This is not the same as knowing what you want. Nor is it the same as knowing what your application has
requested. And it's certainly not the same thing as accepting everything and anything.
SQL injection
A SQL injection vulnerability occurs when a user is able to pass SQL code directly to the application in such a
way that the code will be executed in a query. For example, the user is presented with a login screen, in which
the username and password is entered. The password variable might be used in the following query.
"select * from users where username = '" + $username + "'
and password = '" + $password + "'"
Consider what would happen if the user submitted the following password: ' or '1' = '1 . The final
SQL statement might look something like this:
"select * from users where username = 'wrestler'
and password = 'secret' or '1' = '1'"
Not checking for SQL-specific characters can open your application up to a wide range of vulnerabilities.
CakePHP's Sanitize component can help make this easy.
Cross-site scripting
Cross-site scripting (XSS) refers to a large classification of vulnerabilities that focus on the ability to present
malicious code to an unsuspecting user. This usually takes the form of malicious JavaScript, which could do
anything from annoying the user to capturing data from cookies.
At the heart of the XSS vulnerability is an application that filters user data improperly once submitted. For
example, suppose you're building an application with a forum and did no filtering against the user data.
Anything submitted for a forum post could be displayed. As an evil user, suppose I submit the following text
as a forum post:
http://www-128.ibm.com/developerworks/opensource/library/os-php-cake3/
Page 4 of 11
332049119.004.png 332049119.005.png 332049119.006.png
Cook up Web sites fast with CakePHP, Part 3: Use Sanitize for your protection
03/06/2007 08:15 PM
<script>alert("EXPLETIVES!!!")</script>
If the application permits this text, anyone who viewed my post would get a JavaScript alert box that shouted
expletives at them. While not particularly harmful, it's certainly not something you want the boss to see.
This is a very simple example of a harmless XSS exploitation. While this example is fairly harmless, XSS is
anything but. XSS has been used to steal passwords, steal credit card numbers, forge news stories, and much
more. Protecting yourself and your application from XSS is important. CakePHP can help you with Sanitize.
Cross-Site Request Forgery
Cross-Site Request Forgery (CRSF) may not be as popular or as well known as XSS, but that doesn't make it
any less dangerous.
To demonstrate, suppose your application included a forum, and the forum granted a thread's author
permission to delete the thread. You have built this into the forum as a button that is only shown to the author,
and you even verify that the author is the one who made the request before performing the actual delete. It
might work by posting a field name called action with the value delete , and a field name called id that
contains a unique ID for the thread. In a query string, it might look something like
http://localhost/forum.php?action=delete&id=1729 .
Now suppose we post an image, or have the ability to specify an image as a signature, and we provide as the
URL to that image the same query string. In HTML, it would ultimately look something like this:
<img src="http://localhost/forum.php?action=delete&id=1729">
I can't go to the URL directly myself because I'm not the author, and the application knows it. But if the
thread views my post, the browser will attempt to load the image by requesting
http://localhost/forum.php?action=delete&id=1729 -- and since it is the author
making the request, the thread gets deleted.
This is an overly simple look at CSRF and how it works. CakePHP's Security component can help protect you.
Sanitize
Enter Sanitize, which is CakePHP's class to help you deal with data security issues. Unlike the ACL
component discussed in Part 2 , the Sanitize component is included by adding a line to the top of your
controller. For example, if you want to use Sanitize in your products controller, the top of your controller
might look like this:
Listing 5. Using Sanitize in Products
<?php
uses('sanitize');
class ProductsController extends AppController
{
...
Sanitize provides four methods for applying varying levels of data security to user-submitted data. Each
method serves a distinct purpose.
The Sanitize paranoid method
http://www-128.ibm.com/developerworks/opensource/library/os-php-cake3/
Page 5 of 11
332049119.007.png
 
332049119.008.png 332049119.009.png
Zgłoś jeśli naruszono regulamin