File Upload Attack
Sometimes in addition to standard form data, you also need to allow users to upload files. Since files are transferred in a form differently than other form data, you must specify a special encoding multipart/form-data:
CODE:
<form action="upload.php" method="POST" enctype="multipart/form-data">
A form with both ordinary form data and files is a special format, and specifying the encoding method allows the browser to process it according to the requirements of the format .
The form element that allows users to select files and upload them is very simple:
CODE:
<input type="file" name="attachment" />
The appearance of this element varies in various browsers. Traditionally, the interface includes a standard text box and a browse button, so that the user can directly enter the path of the file manually or select it through browsing. In Safari browser there is only browse button. Fortunately, their functions and behaviors are the same.
To better demonstrate the file upload mechanism, the following is an example that allows users to upload attachments:
CODE:
<form action="upload.php" method="POST" enctype="multipart/form-data">Please choose a file to upload:
The hidden form variable MAX_FILE_SIZE tells the browser the maximum allowed upload file size. Like many client restrictions, this one can be easily bypassed by an attacker, but it provides guidance for legitimate users. This restriction is only reliable if done on the server.
Among the PHP configuration variables, upload_max_filesize controls the maximum file size allowed to be uploaded. At the same time, post_max_size (the maximum submitted data size of the POST form) can also potentially be controlled, because the file is uploaded through the form data.
The receiving program upload.php displays the contents of the super global array $_FILES:
CODE:
<?php header('Content-Type: text/plain'); print_r($_FILES); ?>
In order to understand the upload process, we use a file named author.txt for testing. Here is its content:
CODE:
Chris Shiflett http://miracleart.cn/
When you upload this file to the upload.php program, you can see output similar to the following in the browser:
CODE:
Array ( [attachment] => Array ( [name] => author.txt [type] => text/plain [tmp_name] => /tmp/phpShfltt [error] => 0 [size] => 36 ) )
## Although it can be seen from the above that PHP is actually super global The content provided in the array $_FILES, but it cannot give the original information of the form data. As a security-focused developer who needs to identify input to know what the browser is actually sending, it’s worth taking a look at the following HTTP request information:
CODE:
POST /upload.php HTTP/1.1 Host: example.org Content-Type: multipart/form-data; boundary=----------12345 Content-Length: 245 ----------12345 Content-Disposition: form-data; name="attachment"; filename="author.txt" Content-Type: text/plain Chris Shiflett http://miracleart.cn/ ----------12345 Content-Disposition: form-data; name="MAX_FILE_SIZE" 1024 ----------12345--
Since PHP saves the uploaded file in the temporary file area of ??the file system (/tmp/phpShfltt in this example), the usual operation is to move it to other places for saving and reading it into memory. There is a theoretical risk if you don't check tmp_name to make sure it's an uploaded file (and not something like /etc/passwd). It is called a theoretical risk because there is no known attack method that allows an attacker to modify the value of tmp_name. However, just because there are no means of attack doesn’t mean you don’t need to take some simple security measures. New attacks appear every day, and one simple step can protect your system.
PHP provides two convenient functions to mitigate these theoretical risks: is_uploaded_file() and move_uploaded_file( ). If you need to ensure that the file in tmp_name is an uploaded file, you can use is_uploaded_file():
CODE:
<?php
$filename = $_FILES['attachment']['tmp_name'];
if (is_uploaded_file($filename))
{
/* $_FILES['attachment']['tmp_name'] is an
uploaded file. */
}
?>
如果你希望只把上傳的文件移到一個固定位置,你可以使用move_uploaded_file( ):
CODE:
<?php $old_filename = $_FILES['attachment']['tmp_name']; $new_filename = '/path/to/attachment.txt'; if (move_uploaded_file($old_filename, $new_filename)) { /* $old_filename is an uploaded file, and the move was successful. */ } ?>
最后你可以用 filesize( ) 來校驗(yàn)文件的大?。?/span>
CODE:
<?php $filename = $_FILES['attachment']['tmp_name']; if (is_uploaded_file($filename)) { $size = filesize($filename); } ?>
這些安全措施的目的是加上一層額外的安全保護(hù)層。最佳的方法是永遠(yuǎn)盡可能少地去信任。?
以上就是PHP安全-文件上傳攻擊的內(nèi)容,更多相關(guān)內(nèi)容請關(guān)注PHP中文網(wǎng)(miracleart.cn)!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

TostaycurrentwithPHPdevelopmentsandbestpractices,followkeynewssourceslikePHP.netandPHPWeekly,engagewithcommunitiesonforumsandconferences,keeptoolingupdatedandgraduallyadoptnewfeatures,andreadorcontributetoopensourceprojects.First,followreliablesource

PHPbecamepopularforwebdevelopmentduetoitseaseoflearning,seamlessintegrationwithHTML,widespreadhostingsupport,andalargeecosystemincludingframeworkslikeLaravelandCMSplatformslikeWordPress.Itexcelsinhandlingformsubmissions,managingusersessions,interacti

TosettherighttimezoneinPHP,usedate_default_timezone_set()functionatthestartofyourscriptwithavalididentifiersuchas'America/New_York'.1.Usedate_default_timezone_set()beforeanydate/timefunctions.2.Alternatively,configurethephp.inifilebysettingdate.timez

TovalidateuserinputinPHP,usebuilt-invalidationfunctionslikefilter_var()andfilter_input(),applyregularexpressionsforcustomformatssuchasusernamesorphonenumbers,checkdatatypesfornumericvalueslikeageorprice,setlengthlimitsandtrimwhitespacetopreventlayout

ThePhpfunctionSerialize () andunserialize () AreusedtoconvertcomplexdaTastructdestoresintostoraSandaBackagain.1.Serialize () c OnvertsdatalikecarraysorobjectsraystringcontainingTypeandstructureinformation.2.unserialize () Reconstruct theoriginalatataprom

You can embed PHP code into HTML files, but make sure that the file has an extension of .php so that the server can parse it correctly. Use standard tags to wrap PHP code, insert dynamic content anywhere in HTML. In addition, you can switch PHP and HTML multiple times in the same file to realize dynamic functions such as conditional rendering. Be sure to pay attention to the server configuration and syntax correctness to avoid problems caused by short labels, quotation mark errors or omitted end labels.

The key to writing clean and easy-to-maintain PHP code lies in clear naming, following standards, reasonable structure, making good use of comments and testability. 1. Use clear variables, functions and class names, such as $userData and calculateTotalPrice(); 2. Follow the PSR-12 standard unified code style; 3. Split the code structure according to responsibilities, and organize it using MVC or Laravel-style catalogs; 4. Avoid noodles-style code and split the logic into small functions with a single responsibility; 5. Add comments at key points and write interface documents to clarify parameters, return values ??and exceptions; 6. Improve testability, adopt dependency injection, reduce global state and static methods. These practices improve code quality, collaboration efficiency and post-maintenance ease.

Yes,youcanrunSQLqueriesusingPHP,andtheprocessinvolveschoosingadatabaseextension,connectingtothedatabase,executingqueriessafely,andclosingconnectionswhendone.Todothis,firstchoosebetweenMySQLiorPDO,withPDObeingmoreflexibleduetosupportingmultipledatabas
