Home Backend Development PHP Tutorial Newbies should develop some good security habits in PHP: turning off error prompts and strict data verification, etc.

Newbies should develop some good security habits in PHP: turning off error prompts and strict data verification, etc.

Jul 17, 2017 am 11:22 AM
php closure

When you use PHP for web development, you need to pay attention to some security configuration items and turn off certain functions to prevent users from inadvertently causing various problems.

1. Turn off the php error prompt function

Change display_errors to OFF in php.ini, or add # before the php file ##error_reporting(0).

Use error_reporting(0); Failure example:

<?php  
error_reporting(0);  
echo 555  
echo 444;  
?>
Copy after login

Error:

Parse error: parse error, expecting `','' or `';'' in E:\webphp\2.php on line 4

Many phpers say that using error_reporting(0) does not work. In the first example, there is a fatal error in A.php, which prevents execution. If the server cannot be executed, it does not know that it has this function, so the same error is reported.

2. Turn off some "bad features"

1) Turn off the magic quotes function


Put magic_quotes_gpc = OFF in php.ini
Avoid and
addslashesWait for repeated escaping

2) Turn off register_globals = Off

Put register_globals = OFF in php.ini

In the case of register_globals = ON

<?php  
//$bloger = $_GET[&#39;bloger&#39;]   
//因为register_globals = ON 所以这步不用了直接可以用$bloger  
echo $bloger;  
?>
Copy after login

This situation will cause some uninitialized variables to be easily modified, which may be fatal. So turn register_globals = OFF

(3) Strictly

configure file permissions.

Assign permissions to the corresponding folders. For example, files containing uploaded images cannot have execution permissions and can only be read

3. Strict data verification, what we need to do is to strictly verify the control data Flow, even if one of the 100 million users is a bad user, it is enough to be fatal. Besides, good users sometimes become "bad" inadvertently when they accidentally enter Chinese in the data input box.

In order to ensure the security and robustness of the program, data verification should include

(1) Whether key data exists. For example, whether the deleted data id exists

(2)
The data typeis correct. For example, whether the deleted data id is an integer(3) Data length. If the field is of char(10) type, strlen must be used to determine the data length
(4) Whether the data has dangerous characters

The data length problem, such as the database table field char(25), most PHPers consider whether If it is empty, the data type is correct, but the character length is ignored. Ignoring it is better because it is too lazy to judge the length.

I think the front-end has been verified using js, and the back-end does not need to judge and verify. This is also fatal. You must know that it only takes a few minutes to forge a form. The js judgment is only to reduce the number of user submissions, thereby improving the user experience, reducing http requests and reducing server pressure. In a safe situation, it cannot prevent "villains". Of course, if the legitimate user It is perfect under js verification control, but as phper we cannot only have js verification and abandon another security verification.

Lack of validation for some attributes of the form, such as select, checkbox, radio, button, etc. The developer has set the value and value range (whitelist value) of these attributes on the web page. These attribute values ​​are in JS verification generally does not verify, because legitimate users only have the right to choose and not modify, and then PHPer will not verify the data when it accepts the data at the backend to process the verification data. This is an inertial thinking, and security issues arise. The villain is a fake form.

The name of the corresponding element in the form is consistent with the field name of the data table. For example, the user name field in the user table is user_name, and then the user name input box in the form is also user_name. This is no different from a violent database.

The above is the detailed content of Newbies should develop some good security habits in PHP: turning off error prompts and strict data verification, etc.. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

CakePHP Date and Time CakePHP Date and Time Sep 10, 2024 pm 05:27 PM

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

Discuss CakePHP Discuss CakePHP Sep 10, 2024 pm 05:28 PM

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

CakePHP File upload CakePHP File upload Sep 10, 2024 pm 05:27 PM

To work on file upload we are going to use the form helper. Here, is an example for file upload.

CakePHP Creating Validators CakePHP Creating Validators Sep 10, 2024 pm 05:26 PM

Validator can be created by adding the following two lines in the controller.

How To Set Up Visual Studio Code (VS Code) for PHP Development How To Set Up Visual Studio Code (VS Code) for PHP Development Dec 20, 2024 am 11:31 AM

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

CakePHP Quick Guide CakePHP Quick Guide Sep 10, 2024 pm 05:27 PM

CakePHP is an open source MVC framework. It makes developing, deploying and maintaining applications much easier. CakePHP has a number of libraries to reduce the overload of most common tasks.

How do you parse and process HTML/XML in PHP? How do you parse and process HTML/XML in PHP? Feb 07, 2025 am 11:57 AM

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

See all articles