Home > Backend Development > PHP Tutorial > PHP安全编程:会话数据注入

PHP安全编程:会话数据注入

WBOY
Release: 2016-06-23 13:50:10
Original
1113 people have browsed it

一个与会话暴露类似的问题是会话注入。此类攻击是基于你的WEB服务器除了对会话存储目录有读取权限外,还有写入权限。因此,存在着编写一段允许其他用户添加,编辑或删除会话的脚本的可能。下例显示了一个允许用户方便地编辑已存在的会话数据的HTML表单:

<?phpsession_start ();?>
Copy after login
read()){ if (substr($filename, 0, 5) == 'sess_') { $sess_data = file_get_contents("$path/$filename"); if (!empty($sess_data)) { session_decode($sess_data); $sess_data = $_SESSION; $_SESSION = array(); $sess_name = substr($filename, 5); $sess_name = htmlentities($sess_name, ENT_QUOTES, 'UTF-8'); echo "

Session [$sess_name]

"; foreach ($sess_data as $name => $value) { $name = htmlentities($name, ENT_QUOTES, 'UTF-8'); $value = htmlentities($value, ENT_QUOTES, 'UTF-8'); echo "

$name:

"; } echo '
'; } }}$handle->close();?>

脚本inject.php执行由表单所指定的修改:


<?phpsession_start ();$path = ini_get('session.save_path');foreach ($_POST as $sess_name => $sess_data){  $_SESSION = $sess_data;  $sess_data = session_encode;  file_put_contents("$path/$sess_name", $sess_data);}$_SESSION = array();?>
Copy after login

此类攻击非常危险。攻击者不仅可以编辑你的用户的数据,还可以编辑他自己的会话数据。它比会话劫持更为强大,因为攻击者能选择所有的会话数据进行修改,从而使绕过访问限制和其他安全手段成为可能。

针对这个问题的最好解决方案是将会话数据保存在数据库中。参见专题前面的内容。

延伸阅读

此文章所在专题列表如下:http://www.nowamagic.net/librarys/veda/detail/2079



Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template