« Displaying Chinese UTF-8 characters in gvim on Windows | Prosper's insecure bank account management feature » |
$_SERVER['PHP_SELF'] and cross-site scripting
Monday, May 20, 2013
It's tempting to assume that PHP's $_SERVER array mostly contains fields out of the reach of an attacker, since these are "server" variables. However, that's not always the case; in particular, the seemingly innocuous PHP_SELF
field can be a vector for cross-site scripting.
For example, consider the following foo.php
:
<form method="POST" action="<?php echo $_SERVER['PHP_SELF'] ?>"> <!-- ...form elements... --> </form>
If I visit http://www.example.com/foo.php
, $_SERVER['PHP_SELF']
will be /foo.php
and everything will work correctly.
But what if I visit http://www.example.com/foo.php/"><script>alert('hello');</script>
instead? Then the rendered HTML will be:
<form method="POST" action="/foo.php/"><script>alert('hello');</script>">
<!-- ...form elements... -->
</form>
This allows injection of arbitrary script running under the host site's context, also known as XSS. Two ways to fix this are:
- Use
$_SERVER['SCRIPT_NAME']
instead of$_SERVER['PHP_SELF']
. The former is the name of the actual script file and can't normally be manipulated by an attacker. - Use htmlspecialchars(), which by default will escape double-quotes and prevent a user-supplied string from breaking out of an HTML attribute context.
By the way, this was pretty surprising behavior to me for two reasons:
- The documentation of PHP_SELF is misleading: The first sentence says:
It seems odd that PHP would refer to something likeThe filename of the currently executing script, relative to the document root.
/foo.php/"><script>alert('hello');</script>
as a "filename." - It's pretty bizarre default behavior that PHP will execute
/foo.php
for a request of/foo.php/bar/baz
.
Comments
www.dandysworldgame.com on Thursday, January 30, 2025 at 23:40
<a href="https://www.sprunkis.top/ ">sprunki</a> prunkis.top
Shirleygobby on Sunday, February 2, 2025 at 12:31
We invite you to our club - a place where dance becomes art!
We offer all kinds of dance styles for skill levels.
For more information, follow the link <a href=https://go-tango.ru/argentinskoe-tango/>школа танго в москве для начинающих </a>
Our team professional coaches will help you develop skills and love for dance.
SadieBax on Sunday, February 2, 2025 at 13:02
Discover the world of enjoyment with our pools!
We offer a huge selection of pools, their installation and maintenance.
More detailed information on the link <a href=https://pools-vsem.ru/stroitelstvo-bassejnov/>сколько стоит бассейн строительство </a>
Create an oasis at home with best solutions.
Individual approach and guarantees for all work.
www.dandysworldgame.com on Monday, February 3, 2025 at 15:21
<a href="https://www.dandysworldgame.com/">Dandy's World</a> dandysworldgame.com
dandysworldgame.com on Monday, February 3, 2025 at 21:53
<a href="https://www.youakemao.com">youakemao.com</a> youakemao.com
Gordoninsok on Tuesday, February 4, 2025 at 14:00
https://long-living.ru/
dandysworldgame.com on Tuesday, February 4, 2025 at 14:36
<a href="https://www.hqlc.com/">环球理财</a> hqlc.com
Gordoninsok on Tuesday, February 4, 2025 at 14:49
https://long-living.ru/
Gordoninsok on Tuesday, February 4, 2025 at 17:50
https://long-living.ru/
David Annis on Wednesday, June 25, 2014 at 06:32
I have used the fact that php will execute /foo.php from a request that contains /foo.php/bar to make search engine friendly URLs because many search engines will not index both wheretodrink.php?answer=bar and wheretodrink.php?answer=home because they fear an infinite set of URLs.