ThinkPHP no operation, empty controller processing
When an expert browses your website, the error message of your website will provide hackers with information to attack your website. For example, for empty operations and empty controllers, you will expose the framework used by your website backend to hackers, and hackers will attack your website based on the vulnerabilities of the framework. Therefore, we need to handle empty controllers and empty operations without leaving any clues to hackers.
1. No-operation processing
First look at the effect:
For me, I do not have a hello method in the IndexController.class.php file. If I try When accessing this method, the following information will be reported:
Note: The essence of a no-op: an object (controller) calls a method that does not exist
For developers who understand ThinkPHP, it is easy to see that the backend of this website uses the ThinkPHP framework. So how do we block these problems? That's what we're going to talk about today.
Solution 1, add a __call($method,$argvs) method in the controller
##Like this , when you access the hello method again, the controller's __call($method,$args) method will be called by default.
The location of the common controller parent class: ThinkPHP/Library/Think/Controller.class.php
Solution 2Create a template with the same name for the name of the empty operation, and the system will automatically call the template. 2. Empty controller processingBecause there is no BeijingController.class.php file, an error is reported! !
After analyzing the source code of the TP framework, we have the following solution
When an expert browses your website, the error message on your website will provide hackers with information to attack your website. For example, for empty operations and empty controllers, you will expose the framework used by your website backend to hackers, and hackers will attack your website based on the vulnerabilities of the framework. Therefore, we need to handle empty controllers and empty operations without leaving any clues to hackers.1. No operation processing First look at the effect:
For me, I don’t have hello in the file IndexController.class.php method, if I try to access this method, the following information will be reported:
Note: The essence of a no-op: an object (controller) calls a method that does not exist
For developers who know ThinkPHP, it is easy to see that the backend of this website uses the ThinkPHP framework. So how do we block these problems? That's what we're going to talk about today.
Solution 1, add a __call($method,$argvs) method in the controller
In this way, when you Accessing the hello method again will call the controller's __call($method,$args) method by default.
but! When we have many controllers, do I need to write a __call($method,$args) method for each controller? Obviously unreasonable! Therefore, we need to write this method into the parent class of the controller, just through inheritance. When we go into Controller.class.php, we can find the __call() method, because TP has already done it for us. In his mind, it depends on whether we have defined a method called _empty() in the controller. . If defined, call this method
The location of the common controller parent class: ThinkPHP/Library/Think/Controller.class.php
Solution 2
Create a template with the same name for the name of the empty operation, and the system will automatically call the template.
2. Empty controller processing
Because there is no BeijingController.class.php file, an error is reported! !
After analyzing the source code of the TP framework, we have the following solution
So, we need to define an empty controller. When we access a controller that does not exist, an error will be reported to us according to the error we specified.
For more ThinkPHP empty operations and empty controller processing related articles, please pay attention to the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...
