Edit report at https://bugs.php.net/bug.php?id=54374&edit=1
ID: 54374
User updated by: lekensteyn at gmail dot com
Reported by: lekensteyn at gmail dot com
Summary: Insufficient validating of upload name leading to
corrupted $_FILES indices
Status: Open
-Type: Documentation Problem
+Type: Bug
Package: Variables related
Operating System: All
-PHP Version: 5.3.6
+PHP Version: 5.3.8
Block user comment: N
Private report: N
New Comment:
This is not a documentation bug and still exists in PHP 5.3.8.
Previous Comments:
------------------------------------------------------------------------
[2011-03-24 20:07:31] lekensteyn at gmail dot com
Description:
------------
SAPI: Apache 2 module (it should apply to other SAPI's which accepts uploads as
well)
OS: Debian 6 (it should apply to other OSes as well)
PHP: 5.3.6 (from source, test compile: ./configure --prefix=/tmp/diebug
--disable-all --with-apxs2=/tmp/diebug/bin/apxs --disable-cli)
Upload names with brackets ([ and ]) are created for creating arrays of files.
Any array index or variable name containing a bracket should be invalid.
The current implementation only checks whether more closing brackets are
detected than opening brackets.
Related files
http://lxr.php.net/opengrok/xref/PHP_5_3/main/rfc1867.c#990
http://lxr.php.net/opengrok/xref/PHP_TRUNK/main/rfc1867.c#920
Relevant code:
--snip--
/* New Rule: never repair potential malicious user input */
if (!skip_upload) {
long c = 0;
tmp = param;
while (*tmp) {
if (*tmp == '[') {
c++;
} else if (*tmp == ']') {
c--;
if (tmp[1] && tmp[1] != '[') {
skip_upload = 1;
break;
}
}
if (c < 0) {
skip_upload = 1;
break;
}
tmp++;
}
}
--snip--
So names like `test]` and `test[]]` are invalid, but names like `test[` pass
this test.
Now it gets worse, the upload is accepted and without checking the name, and
registered:
--snip--
if (is_arr_upload) {
snprintf(lbuf, llen, "%s[name][%s]", abuf, array_index);
} else {
snprintf(lbuf, llen, "%s[name]", param);
}
if (s && s > filename) {
register_http_post_files_variable(lbuf, s+1, http_post_files, 0
TSRMLS_CC);
} else {
register_http_post_files_variable(lbuf, filename, http_post_files, 0
TSRMLS_CC);
}
--snip--
register_http_post_files_variable calls safe_php_register_variable:
--snip
if (override_protection || !is_protected_variable(var TSRMLS_CC)) {
php_register_variable_safe(var, strval, val_len, track_vars_array
TSRMLS_CC);
}
--snip--
override_protection is false, the only condition that checks whether the
variable name is accepted is the is_protected_variable call, passing the upload
name. The variable name is normalized using normalize_protected_variable() and
then checked for existence in the $_FILES array.
The normalization function normalize_protected_variable checks whether a
closing bracket is found, and otherwise uses the following string as index:
--snip--
indexend = strchr(index, ']');
indexend = indexend ? indexend + 1 : index + strlen(index);
--snip--
This implies that the index name can contain a opening bracket as well, which
will be accepted and passed directly to php_register_variable_safe.
The suggested patch adds a check to ensure that the leftover open brackets is
always zero. If not, it simply drops the upload (better safe than sorry).
Test script:
---------------
<?php
if (isset($_POST['submitted'])) {
if (isset($_FILES['test'])) {
if (isset($_FILES['test']['error'])) {
echo 'OK expected result';
} else if(isset($_FILES['test']['[error'])) {
echo 'Unexpected result';
}
} else {
echo 'OK expected result';
}
printf('<pre>%s</pre>', htmlspecialchars(print_r($_FILES, true)));
}
?>
<form enctype="multipart/form-data" method="post">
<input type="file" name="test[">
<input type="submit" name="submitted">
</form>
Expected result:
----------------
I expected to see "OK expected result" and an empty array dump because the name
is invalid.
Actual result:
--------------
The test script produces "Unexpected result".
The upload is accepted but the $_FILES array is corrupted:
Array
(
[test] => Array
(
[[name] =>
[[type] =>
[[tmp_name] =>
[[error] => 4
[[size] => 0
)
)
------------------------------------------------------------------------
--
Edit this bug report at https://bugs.php.net/bug.php?id=54374&edit=1