From: tom at punkave dot com
Operating system: MacOS X 10.5
PHP version: 5.2.6
PHP Bug Type: cURL related
Bug description: POST file upload implementation is a security hole
Description:
------------
PHP's cURL wrapper implements HTTP POST file uploads as follows:
curl_setopt($curl_handle, CURLOPT_POST, 1);
$args['file'] = '@/path/to/file';
curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $args);
When ext/curl/interface.c sees that $args is an array and not a
query-encoded string, it switches to a branch that uses CURLOPT_HTTPPOST
rather than CURLOPT_POST. The code then checks for an '@' prefix in the
value of every field. When an '@' is spotted, that particular field is
treated as a file to be uploaded rather than a value to be sent as-is.
This implementation and the associated documentation have the following
problems which are best described together for clarity's sake:
1. The fact that passing an array of arguments will trigger
multipart/form-data is not documented. The documentation implies that you
can use a query-encoded string or an array interchangeably. While most
servers do accept multipart/form-data this is not a given. Also it is
frequently the less efficient of the two encodings when files are not being
uploaded.
2. When passing an array it is impossible to submit a form field value
that does start with @. This is a bug in the implementation.
3. The documentation makes no mention of the '@ prefix means the rest of
the value is a filename to be uploaded' issue. This is a serious security
problem. PHP pages that transship form submissions from one site to another
are being coded in ignorance of the fact that the '@' prefix could be used
by end users to send any readable file on the first host to the second
host. At a minimum, coders must check for and remove any @ prefix from
user-submitted fields.
A recommended solution:
1. The '@ prefix for files, arrays trigger multipart/form-data' behavior
should be controlled by a php.ini backwards compatibility option, hopefully
defaulting off in the future.
2. CURLOPT_HTTPPOST and CURLOPT_HTTPPOSTFIELDS should be explicitly
supported and documented as the correct way to do multipart/form_data, and
3. Instead of an @ prefix in the values of fields,
CURLOPT_HTTPPOSTFILEFIELDS should be implemented to expressly pass an hash
of keys => filenames.
It would work like this:
// I want a file upload with cURL
curl_setopt($curl_handle, CURLOPT_HTTPPOST, 1);
// Pass the non-file fields
curl_setopt($curl_handle, CURLOPT_HTTPPOSTFIELDS,
array("name" => "Joe Smith"));
// Pass the file fields
curl_setopt($curl_handle, CURLOPT_HTTPPOSTFILEFIELDS,
array("file" => "/path/to/file"));
HTTPPOST is a terrible, confusing name for multipart/form_data, but that's
a cURL problem, not a PHP problem. (: With the above implementation at the
PHP level we would at least have a correct wrapper for cURL on which
friendlier classes could be correctly built.
--
Edit bug report at http://bugs.php.net/?id=46439&edit=1
--
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=46439&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=46439&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):
http://bugs.php.net/fix.php?id=46439&r=trysnapshot60
Fixed in CVS:
http://bugs.php.net/fix.php?id=46439&r=fixedcvs
Fixed in CVS and need be documented:
http://bugs.php.net/fix.php?id=46439&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=46439&r=alreadyfixed
Need backtrace:
http://bugs.php.net/fix.php?id=46439&r=needtrace
Need Reproduce Script:
http://bugs.php.net/fix.php?id=46439&r=needscript
Try newer version:
http://bugs.php.net/fix.php?id=46439&r=oldversion
Not developer issue:
http://bugs.php.net/fix.php?id=46439&r=support
Expected behavior:
http://bugs.php.net/fix.php?id=46439&r=notwrong
Not enough info:
http://bugs.php.net/fix.php?id=46439&r=notenoughinfo
Submitted twice:
http://bugs.php.net/fix.php?id=46439&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=46439&r=globals
PHP 4 support discontinued: http://bugs.php.net/fix.php?id=46439&r=php4
Daylight Savings: http://bugs.php.net/fix.php?id=46439&r=dst
IIS Stability:
http://bugs.php.net/fix.php?id=46439&r=isapi
Install GNU Sed:
http://bugs.php.net/fix.php?id=46439&r=gnused
Floating point limitations:
http://bugs.php.net/fix.php?id=46439&r=float
No Zend Extensions:
http://bugs.php.net/fix.php?id=46439&r=nozend
MySQL Configuration Error:
http://bugs.php.net/fix.php?id=46439&r=mysqlcfg