Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,162,588 members, 7,850,979 topics. Date: Wednesday, 05 June 2024 at 11:47 AM

Php Security Guide: Form Processing - Webmasters - Nairaland

Nairaland Forum / Science/Technology / Webmasters / Php Security Guide: Form Processing (1260 Views)

Form Processing In Dreamweaver (2) (3) (4)

(1) (Reply) (Go Down)

Php Security Guide: Form Processing by Nobody: 9:49am On Jul 29, 2011
To learn more about protecting your website, please click here:

http://phpsec.org/projects/guide/2.html
Re: Php Security Guide: Form Processing by instinctg(m): 9:11am On Jul 30, 2011
tanks
Re: Php Security Guide: Form Processing by Nobody: 9:12am On Jul 30, 2011
Serio? u are welcome amigo
Re: Php Security Guide: Form Processing by Nobody: 9:17am On Jul 30, 2011
Something else that can help to an extent is to validate urls. For instance, my framework does not accept illegality in the urls,
if for instance you want to visit a page like: http://dhtmlkits.com/lagos.php
u can add anything u like to the url e.g. http://dhtmlkits.com/lagos.php?user=myself
but you can never add nonsense like http://dhtmlkits.com/lagos.php?user='
or even use < - escape it if you like, if you add something that is not normally in normal urls you are bounced immediately
to a 404 error page - just in case one stupid module decides to go and echo out the xss attack.
Re: Php Security Guide: Form Processing by DualCore1: 9:33am On Jul 30, 2011
lol
Re: Php Security Guide: Form Processing by Nobody: 9:35am On Jul 30, 2011
Yeah, sometimes even professional developers forget the basic rules of vulnerability - and even some of my past stuffs are vulnerable to simple sql injection that a primary 1 hacker can use.
Re: Php Security Guide: Form Processing by DualCore1: 12:39pm On Jul 30, 2011
lol yea, this ?id=22 always look like bread and butter to toy with. grin
Re: Php Security Guide: Form Processing by instinctg(m): 11:07am On Jul 31, 2011
Wat about encrypting url variables?
Re: Php Security Guide: Form Processing by Nobody: 11:18am On Jul 31, 2011
Lemme give a very short lesson here again about forms.

Now, i have created a form and i said that only users with a certain privilege can access that form to start with,
so on submit, i say display information about secrets.

Remember, the form will never load for someone without the right privileges to start with. Now, what happens if a script
from elsewhere does a fake submit? Of course, even the referral and other signatures can be forged too.
Well, you must to an extent be able to validate this.

Now, to the use of tokens, token are small bits of information that you stick into your form during generation,
you can for instance say md5(time()) - and save it inside session, and put it in a form. A form that is submitted from elsewhere
without the right tokens is invalid. But this too can be bypassed, sebi na to read the token inside the generated forms to start
with?

These are other things you should worry out. Even simple captchas are bypassed - recaptcha however is much better.

Now, as to encoding url variables? hmmm, what kinda encoding are we talking about here? zend or base64 or md5

If you dont use md5 properly, them go break into your security fairly easily too.


One thing many developers dont do is to verify data types. And i will give an example. Now you have made a site that works like this:

mysite.com/page=1 - this is home page
mysite.com/page=2 - this is about page

you could also use another algorithm like this:
mysite.com/page=page1 - this is home page
mysite.com/page=page2 - this is about page

If you make use of numbers for the page variable, then you should ensure that whatever comes from the browser is the right data type
before even passing it into your database in the first place - so that your database should not swallow poison.

Then your real_escape_string or addslashes and htmlentities may come next.
Re: Php Security Guide: Form Processing by dhtmlextreme(m): 11:31am On Jul 31, 2011
I will add another one here again.

If you have a website where people register, and you decide to say that,
people should register with usernames of 6 characters - then you should validate
this on the backend too no matter what you do on the frontend.

Nairaland for instance: the registration form does not allow a username of more than
10 characters i.e dhtmlextre - this is 10 characters,

Normally, you should not be able to use in full as a username.
This is not a security breach, but what i am saying is that you should try to validate
stuffs like that properly for consistency.

If you make a field such as email field, try to verify what is in it is at least typed like an email
before you store it away in your database - and store junks.

Spam filter is another thing - dont buy a spam filter in alaba market!
Re: Php Security Guide: Form Processing by Nobody: 11:47am On Jul 31, 2011
Lets take a look at yet another form scene:

- dual core logs in to his bank online
- He opened several tabs
- Then leaves in hurry, he signed out quite alright
- But he leaves one of the tabs opened, and that
tab contains a form for sending out money.

If you were the one that codes such an app, will you just submit the form like
that? without checking if the owner of the form is still logged in?

These are simple issues that lead to a lot of security breaches.

Consider also file uploads, someone uploads a php script in a photo field,
and gbam - your site turns into a porn site.

Simply because you were very happy that you can finally write code to upload
and did not take the extra time to see what it is that clients are really uploading.


I could go on and on concerning forms, form security is one of the biggest security
threads in the web development world.

All these ones i have said so far are just basics. Because as slr0x and i know, applying
all the above will just reduce and will not totally eliminate hacking down of websites.
Re: Php Security Guide: Form Processing by instinctg(m): 11:57am On Jul 31, 2011
@dhtml
uve made valid points. But one'd be amazed at so many factors of vulnerabily. Some could be prevented eg
1. Hiding apache's output signature
2. Removing phpinfo() calls
3. Using escape shellarg() fxn to prevent shell commands from executing.
And so much more,
Re: Php Security Guide: Form Processing by Nobody: 12:02pm On Jul 31, 2011
You can take a look at this thread: http://it.slashdot.org/story/07/01/06/216245/AJAX-May-Be-Considered-Harmful

I have been following up on ajax prototype hijacking for awhile now. And i concurr with those that say that XSS holes
are the problem rather than the 'ajax prototype' in itself.

Most of what is said earlier on are ways to avoid mainly xss attacks and sql injections.
Re: Php Security Guide: Form Processing by Slyr0x: 1:08pm On Jul 31, 2011
Instinctg, i'll do that stuff for you F.O.C., still busy with lotsa projects. I'll send you a mail when i'm about starting.

smiley
Re: Php Security Guide: Form Processing by Nobody: 1:17pm On Jul 31, 2011
My own question @slyr0x is: how secure is encrypting url variables?
I am not saying that you should not do it. But i feel that putting secure data into url is not safe at all,
whether encrypted or not - just my own opinion sha.

Another thing again is that - it is a rather time-consuming process, encoding, decoding. . .i think the focus
should be more of preventing unauthorized access.

@slyrox, i will like to hear your professional views on this.
Re: Php Security Guide: Form Processing by instinctg(m): 1:19pm On Jul 31, 2011
@sly
tanks so much, i really appreciate. Any technical contributions? Always looking up to ur educative posts
Re: Php Security Guide: Form Processing by instinctg(m): 1:32pm On Jul 31, 2011
*dhtml:

My own question @slyr0x is: how secure is encrypting url variables?
I am not saying that you should not do it. But i feel that putting secure data into url is not safe at all,
whether encrypted or not - just my own opinion sha.

Another thing again is that - it is a rather time-consuming process, encoding, decoding. . .i think the focus
should be more of preventing unauthorized access.

@slyrox, i will like to hear your professional views on this.
how do u run queries dat need to be passed via url? Eg news.php?id=1
sensitive data esp ones dat have to do with authentition can be passed via sessions (which might also need encryption). Yahoo, google use it.
My background in coldfusion further butresses my point. Encryption is not a sure-footed path to absolute protection, but and added security layer with a little more resource on the server footed path to absolute protection, but and added security layer with a little more resource on the server
Re: Php Security Guide: Form Processing by Nobody: 1:37pm On Jul 31, 2011
That is exactly what i expected. It adds security layer - but it does require some work on the server, and also the developer as well.

In a highly secured application, all these stuffs come in very strongly, but in everyday programming. . . .
Re: Php Security Guide: Form Processing by Nobody: 1:40pm On Jul 31, 2011
U might want to take a look at http://www.phpclasses.org/package/2556-PHP-Encrypt-the-parameters-passed-in-link-URLs.html
in the time being.
Combine that with whatever slyr0x gives you - you should ave a head start
Re: Php Security Guide: Form Processing by instinctg(m): 1:58pm On Jul 31, 2011
Wat about url-rewrite? An added technique to prevent sql injection?
Re: Php Security Guide: Form Processing by Nobody: 2:04pm On Jul 31, 2011
Caramba! It seems to me that you are looking for the easiest ways out. Unfortunately, there is no easy way out of this.
How long are you gonna keep rewriting your urls? And what happens if you are working on a server that cannot rewrite?

All forms of user-input whether from a form or from a url can cause problems, so you learn to validate as best as you can.
And even with all that, you can still not wave the security guys like slyr0x aside, after you must have done all your
nonsense encoding, then call slyr0x to test things out for you - after you must ave paid him well.
Re: Php Security Guide: Form Processing by instinctg(m): 2:37pm On Jul 31, 2011
d last thing i do is looking for d easy way out. I dont do url rewrites, just heard it reduces the threat of sql injection.
Re: Php Security Guide: Form Processing by Nobody: 3:30pm On Jul 31, 2011
A url rewrite is very useful for many reason: one of the most important being that it can take actions before your scripts are even loaded - so i think it is useful to an extent.
Re: Php Security Guide: Form Processing by Slyr0x: 10:10am On Aug 01, 2011
Nice one dhtml, iWas hoping to post later till you dragged me here cheesy.

In my opinion, passing sensitive data thru url variables aint Secure but rily nothing is.

Security comes as a result of the constant countermeasures put in place by you. . .capiche. . .By constant iMean, tis something you need to keep doing, you just nid to follow the trend and apply patches when & where necessary.

Forms may be submitted using one of two methods: GET or POST. If using the GET method, all form elements(names,values) will appear in the query string of the next URL the user sees.

Now tampering with hidden form fields is quite easy, but tampering with query strings is much easier.

You only need to look at the URL in the browser's address bar.

Let's take a look at an ecommerce site that deals with selling recharge pins online.

http://www.example.com/buy.php?phonenumber=08033333333&amount=1000&accnt=123

Whr phonenumber - is d fone no u wantu credit;
Amount - amnt of d card you wantu buy
Accnt - whose accnt to deduct that money from.

So by default, d accnt variable is always set to the user's Id.

Imagine a malicious user doing dis

http://www.example.com/buy.php?phonenumber=08044416523&amount=10000&accnt=555

I tnk dats quite explanatory.

Even passing sessions through the url is wrooooonggg!

It all boils down to input validation tho.

Validate all users input, let's say you ve something like dis

http://example.com/shop.php?id=1

And you knw yo id should accept only integers, den u shld ve something like dis

$id = (int) $_GET ['id'];

Etc,

And also let's say ure using an array

['Home','About','Services','Contact']

Make sure yo code does dis

Search in d array, if it exists, pull the page out, if it doesn't, redirect to the homepage or to an error page.

Or let's say ure pulling yo 'id' from the database, if id corresponds with what's in the database, den get the page, else ERROR(error page/homepage).

That way, u've made sure you aint taking any chances.

Coders overlook lotsa things.


Let's say ure working on a social community and people have to chose their D.O.B. from the drop down menu, make sure user's input is being validated. Cos a malicious user might just with the aid of "Tamper Data", intercept what is being sent to the server, then edit the variable, prolly use a SQL query (Select username,password FROM users--) and we know the story from there wink.

Conclusion: Always code with the mentality that your users are MALICIOUS.!
Re: Php Security Guide: Form Processing by Nobody: 4:02pm On Aug 01, 2011
That is very good amigo. Hope you guys are learning?
@syl, what of the form method called PUT?

(1) (Reply)

Php Quiz: Loop Quiz / How To Pay Online (wordpress) / High PR Web 2.0 Sites For SEO Link Building

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 47
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.