diff -Nur php-5.0.4/TSRM/TSRM.h hardened-php-5.0.4-0.2.7/TSRM/TSRM.h --- php-5.0.4/TSRM/TSRM.h 2005-03-11 12:12:07.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/TSRM/TSRM.h 2005-04-07 02:04:38.000000000 +0200 @@ -33,6 +33,13 @@ # define TSRM_API #endif +#if HARDENED_PHP +# if HAVE_REALPATH +# undef realpath +# define realpath php_realpath +# endif +#endif + /* Only compile multi-threading functions if we're in ZTS mode */ #ifdef ZTS @@ -88,6 +95,7 @@ #define THREAD_HASH_OF(thr,ts) (unsigned long)thr%(unsigned long)ts + #ifdef __cplusplus extern "C" { #endif diff -Nur php-5.0.4/TSRM/tsrm_virtual_cwd.c hardened-php-5.0.4-0.2.7/TSRM/tsrm_virtual_cwd.c --- php-5.0.4/TSRM/tsrm_virtual_cwd.c 2005-03-11 12:09:42.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/TSRM/tsrm_virtual_cwd.c 2005-04-07 02:04:38.000000000 +0200 @@ -197,6 +197,165 @@ return p; } +#if HARDENED_PHP +CWD_API char *php_realpath(const char *path, char *resolved) +{ + struct stat sb; + char *p, *q, *s; + size_t left_len, resolved_len; + unsigned symlinks; + int serrno, slen; + int is_dir = 1; + char left[PATH_MAX], next_token[PATH_MAX], symlink[PATH_MAX]; + + serrno = errno; + symlinks = 0; + if (path[0] == '/') { + resolved[0] = '/'; + resolved[1] = '\0'; + if (path[1] == '\0') + return (resolved); + resolved_len = 1; + left_len = strlcpy(left, path + 1, sizeof(left)); + } else { + if (getcwd(resolved, PATH_MAX) == NULL) { + strlcpy(resolved, ".", PATH_MAX); + return (NULL); + } + resolved_len = strlen(resolved); + left_len = strlcpy(left, path, sizeof(left)); + } + if (left_len >= sizeof(left) || resolved_len >= PATH_MAX) { + errno = ENAMETOOLONG; + return (NULL); + } + + /* + * Iterate over path components in `left'. + */ + while (left_len != 0) { + /* + * Extract the next path component and adjust `left' + * and its length. + */ + p = strchr(left, '/'); + s = p ? p : left + left_len; + if (s - left >= sizeof(next_token)) { + errno = ENAMETOOLONG; + return (NULL); + } + memcpy(next_token, left, s - left); + next_token[s - left] = '\0'; + left_len -= s - left; + if (p != NULL) + memmove(left, s + 1, left_len + 1); + if (resolved[resolved_len - 1] != '/') { + if (resolved_len + 1 >= PATH_MAX) { + errno = ENAMETOOLONG; + return (NULL); + } + resolved[resolved_len++] = '/'; + resolved[resolved_len] = '\0'; + } + if (next_token[0] == '\0') + continue; + else if (strcmp(next_token, ".") == 0) + continue; + else if (strcmp(next_token, "..") == 0) { + /* + * Strip the last path component except when we have + * single "/" + */ + if (!is_dir) { + errno = ENOENT; + return (NULL); + } + if (resolved_len > 1) { + resolved[resolved_len - 1] = '\0'; + q = strrchr(resolved, '/'); + *q = '\0'; + resolved_len = q - resolved; + } + continue; + } + + /* + * Append the next path component and lstat() it. If + * lstat() fails we still can return successfully if + * there are no more path components left. + */ + resolved_len = strlcat(resolved, next_token, PATH_MAX); + if (resolved_len >= PATH_MAX) { + errno = ENAMETOOLONG; + return (NULL); + } + if (lstat(resolved, &sb) != 0) { + if (errno == ENOENT && p == NULL) { + errno = serrno; + return (resolved); + } + return (NULL); + } + if (S_ISLNK(sb.st_mode)) { + if (symlinks++ > MAXSYMLINKS) { + errno = ELOOP; + return (NULL); + } + slen = readlink(resolved, symlink, sizeof(symlink) - 1); + if (slen < 0) + return (NULL); + symlink[slen] = '\0'; + if (symlink[0] == '/') { + resolved[1] = 0; + resolved_len = 1; + } else if (resolved_len > 1) { + /* Strip the last path component. */ + resolved[resolved_len - 1] = '\0'; + q = strrchr(resolved, '/'); + *q = '\0'; + resolved_len = q - resolved; + } + + /* + * If there are any path components left, then + * append them to symlink. The result is placed + * in `left'. + */ + if (p != NULL) { + if (symlink[slen - 1] != '/') { + if (slen + 1 >= sizeof(symlink)) { + errno = ENAMETOOLONG; + return (NULL); + } + symlink[slen] = '/'; + symlink[slen + 1] = 0; + } + left_len = strlcat(symlink, left, sizeof(left)); + if (left_len >= sizeof(left)) { + errno = ENAMETOOLONG; + return (NULL); + } + } + left_len = strlcpy(left, symlink, sizeof(left)); + } else { + if (S_ISDIR(sb.st_mode)) { + is_dir = 1; + } else { + is_dir = 0; + } + } + } + + /* + * Remove trailing slash except when the resolved pathname + * is a single "/". + */ + if (resolved_len > 1 && resolved[resolved_len - 1] == '/') + resolved[resolved_len - 1] = '\0'; + return (resolved); +} +#endif + CWD_API void virtual_cwd_startup(void) { char cwd[MAXPATHLEN]; @@ -321,8 +480,7 @@ path = resolved_path; path_length = strlen(path); } else { - /* disable for now - return 1; */ + return 1; } } } else { /* Concat current directory with relative path and then run realpath() on it */ @@ -348,9 +506,8 @@ path = resolved_path; path_length = strlen(path); } else { - /* disable for now free(tmp); - return 1; */ + return 1; } } free(tmp); diff -Nur php-5.0.4/TSRM/tsrm_virtual_cwd.h hardened-php-5.0.4-0.2.7/TSRM/tsrm_virtual_cwd.h --- php-5.0.4/TSRM/tsrm_virtual_cwd.h 2005-03-11 12:07:17.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/TSRM/tsrm_virtual_cwd.h 2005-04-07 02:04:38.000000000 +0200 @@ -128,6 +128,22 @@ typedef int (*verify_path_func)(const cwd_state *); +#ifndef HAVE_STRLCPY +CWD_API size_t php_strlcpy(char *dst, const char *src, size_t siz); +#undef strlcpy +#define strlcpy php_strlcpy +#endif + +#ifndef HAVE_STRLCAT +CWD_API size_t php_strlcat(char *dst, const char *src, size_t siz); +#undef strlcat +#define strlcat php_strlcat +#endif + + +#if HARDENED_PHP +CWD_API char *php_realpath(const char *path, char *resolved); +#endif CWD_API void virtual_cwd_startup(void); CWD_API void virtual_cwd_shutdown(void); CWD_API char *virtual_getcwd_ex(size_t *length TSRMLS_DC); diff -Nur php-5.0.4/Zend/zend.c hardened-php-5.0.4-0.2.7/Zend/zend.c --- php-5.0.4/Zend/zend.c 2005-03-16 00:47:12.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend.c 2005-04-07 02:04:38.000000000 +0200 @@ -54,6 +54,12 @@ ZEND_API void (*zend_unblock_interruptions)(void); ZEND_API void (*zend_ticks_function)(int ticks); ZEND_API void (*zend_error_cb)(int type, const char *error_filename, const uint error_lineno, const char *format, va_list args); +#if HARDENED_PHP +ZEND_API void (*zend_security_log)(char *str); +#endif +#if HARDENED_PHP_INC_PROTECT +ZEND_API int (*zend_is_valid_include)(zval *z); +#endif int (*zend_vspprintf)(char **pbuf, size_t max_len, const char *format, va_list ap); void (*zend_on_timeout)(int seconds TSRMLS_DC); @@ -545,6 +551,14 @@ extern zend_scanner_globals language_scanner_globals; #endif + /* Set up Hardened-PHP utility functions first */ +#if HARDENED_PHP + zend_security_log = utility_functions->security_log_function; +#endif +#if HARDENED_PHP_INC_PROTECT + zend_is_valid_include = utility_functions->is_valid_include; +#endif + #ifdef ZTS ts_allocate_id(&alloc_globals_id, sizeof(zend_alloc_globals), (ts_allocate_ctor) alloc_globals_ctor, (ts_allocate_dtor) alloc_globals_dtor); #else diff -Nur php-5.0.4/Zend/zend.h hardened-php-5.0.4-0.2.7/Zend/zend.h --- php-5.0.4/Zend/zend.h 2005-03-10 12:30:44.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend.h 2005-04-07 02:04:38.000000000 +0200 @@ -359,6 +359,12 @@ void (*on_timeout)(int seconds TSRMLS_DC); int (*stream_open_function)(const char *filename, zend_file_handle *handle TSRMLS_DC); int (*vspprintf_function)(char **pbuf, size_t max_len, const char *format, va_list ap); +#if HARDENED_PHP + void (*security_log_function)(char *str); +#endif +#if HARDENED_PHP_INC_PROTECT + int (*is_valid_include)(zval *z); +#endif } zend_utility_functions; @@ -496,6 +502,16 @@ extern void (*zend_on_timeout)(int seconds TSRMLS_DC); extern ZEND_API int (*zend_stream_open_function)(const char *filename, zend_file_handle *handle TSRMLS_DC); extern int (*zend_vspprintf)(char **pbuf, size_t max_len, const char *format, va_list ap); +#if HARDENED_PHP +extern ZEND_API void (*zend_security_log)(char *str); +#endif +#if HARDENED_PHP_INC_PROTECT +extern ZEND_API int (*zend_is_valid_include)(zval *z); +#endif + +#if HARDENED_PHP_MM_PROTECT || HARDENED_PHP_LL_PROTECT || HARDENED_PHP_HASH_PROTECT +ZEND_API unsigned int zend_canary(void); +#endif ZEND_API void zend_error(int type, const char *format, ...) ZEND_ATTRIBUTE_FORMAT(printf, 2, 3); @@ -620,6 +636,10 @@ #define ZEND_MAX_RESERVED_RESOURCES 4 +#if HARDENED_PHP +#include "hardened_globals.h" +#endif + #endif /* ZEND_H */ /* diff -Nur php-5.0.4/Zend/zend_API.h hardened-php-5.0.4-0.2.7/Zend/zend_API.h --- php-5.0.4/Zend/zend_API.h 2005-01-22 13:29:13.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_API.h 2005-04-07 02:04:38.000000000 +0200 @@ -47,6 +47,7 @@ #define ZEND_METHOD(classname, name) ZEND_NAMED_FUNCTION(ZEND_FN(classname##_##name)) #define ZEND_FENTRY(zend_name, name, arg_info, flags) { #zend_name, name, arg_info, (zend_uint) (sizeof(arg_info)/sizeof(struct _zend_arg_info)-1), flags }, +#define ZEND_STATIC_FE(zend_name, name, arg_info) { zend_name, name, arg_info, (zend_uint) (sizeof(arg_info)/sizeof(struct _zend_arg_info)-1), 0 }, #define ZEND_NAMED_FE(zend_name, name, arg_info) ZEND_FENTRY(zend_name, name, arg_info, 0) #define ZEND_FE(name, arg_info) ZEND_FENTRY(name, ZEND_FN(name), arg_info, 0) diff -Nur php-5.0.4/Zend/zend_alloc.c hardened-php-5.0.4-0.2.7/Zend/zend_alloc.c --- php-5.0.4/Zend/zend_alloc.c 2004-08-27 18:49:54.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/Zend/zend_alloc.c 2005-04-07 02:12:14.000000000 +0200 @@ -64,6 +64,11 @@ # define END_MAGIC_SIZE 0 #endif +#if HARDENED_PHP_MM_PROTECT +# define CANARY_SIZE sizeof(unsigned int) +#else +# define CANARY_SIZE 0 +#endif # if MEMORY_LIMIT # if ZEND_DEBUG @@ -104,9 +109,17 @@ if (p==AG(head)) { \ AG(head) = p->pNext; \ } else { \ + if (p != p->pLast->pNext) { \ + zend_security_log("linked list corrupt on efree() - heap corruption detected"); \ + exit(1); \ + } \ p->pLast->pNext = p->pNext; \ } \ if (p->pNext) { \ + if (p != p->pNext->pLast) { \ + zend_security_log("linked list corrupt on efree() - heap corruption detected"); \ + exit(1); \ + } \ p->pNext->pLast = p->pLast; \ } #else @@ -145,6 +158,12 @@ DECLARE_CACHE_VARS(); TSRMLS_FETCH(); +#if HARDENED_PHP_MM_PROTECT + if (size > LONG_MAX - sizeof(zend_mem_header) - MEM_HEADER_PADDING - END_MAGIC_SIZE - CANARY_SIZE) { + zend_security_log("emalloc() - requested size would result in integer overflow"); + exit(1); + } +#endif CALCULATE_REAL_SIZE_AND_CACHE_INDEX(size); #if !ZEND_DISABLE_MEMORY_CACHE @@ -163,6 +182,10 @@ AG(cache_stats)[CACHE_INDEX][1]++; memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size), &mem_block_end_magic, sizeof(long)); #endif +#if HARDENED_PHP_MM_PROTECT + p->canary = HG(canary_1); + memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size + END_MAGIC_SIZE), &HG(canary_2), CANARY_SIZE); +#endif p->cached = 0; p->size = size; return (void *)((char *)p + sizeof(zend_mem_header) + MEM_HEADER_PADDING); @@ -179,7 +202,7 @@ AG(allocated_memory_peak) = AG(allocated_memory); } #endif - p = (zend_mem_header *) ZEND_DO_MALLOC(sizeof(zend_mem_header) + MEM_HEADER_PADDING + SIZE + END_MAGIC_SIZE); + p = (zend_mem_header *) ZEND_DO_MALLOC(sizeof(zend_mem_header) + MEM_HEADER_PADDING + SIZE + END_MAGIC_SIZE + CANARY_SIZE); #if !ZEND_DISABLE_MEMORY_CACHE } #endif @@ -211,7 +234,10 @@ # endif memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size), &mem_block_end_magic, sizeof(long)); #endif - +#if HARDENED_PHP_MM_PROTECT + p->canary = HG(canary_1); + memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size + END_MAGIC_SIZE), &HG(canary_2), CANARY_SIZE); +#endif HANDLE_UNBLOCK_INTERRUPTIONS(); return (void *)((char *)p + sizeof(zend_mem_header) + MEM_HEADER_PADDING); } @@ -239,6 +265,10 @@ } } + +#if HARDENED_PHP + zend_security_log("Possible integer overflow catched by safe_emalloc()"); +#endif zend_error(E_ERROR, "Possible integer overflow in memory allocation (%zd * %zd + %zd)", nmemb, size, offset); return 0; } @@ -247,9 +277,22 @@ ZEND_API void _efree(void *ptr ZEND_FILE_LINE_DC ZEND_FILE_LINE_ORIG_DC) { +#if HARDENED_PHP_MM_PROTECT + unsigned int *canary_2; +#endif zend_mem_header *p = (zend_mem_header *) ((char *)ptr - sizeof(zend_mem_header) - MEM_HEADER_PADDING); DECLARE_CACHE_VARS(); TSRMLS_FETCH(); + +#if HARDENED_PHP_MM_PROTECT + canary_2 = (unsigned int *)(((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + p->size + END_MAGIC_SIZE); + if (p->canary != HG(canary_1) || *canary_2 != HG(canary_2)) { + zend_security_log("canary mismatch on efree() - heap overflow or double efree detected"); + exit(1); + } + /* to catch double efree()s */ + *canary_2 = p->canary = 0; +#endif #if defined(ZTS) && TSRM_DEBUG if (p->thread_id != tsrm_thread_id()) { @@ -291,23 +334,35 @@ ZEND_API void *_ecalloc(size_t nmemb, size_t size ZEND_FILE_LINE_DC ZEND_FILE_LINE_ORIG_DC) { - void *p; - int final_size = size*nmemb; + char *p; + size_t _size = nmemb * size; + + if (nmemb && (_size/nmemb!=size)) { +#if HARDENED_PHP + zend_security_log("Possible integer overflow catched by ecalloc()"); +#endif + fprintf(stderr,"FATAL: ecalloc(): Unable to allocate %ld * %ld bytes\n", (long) nmemb, (long) size); +#if ZEND_DEBUG && HAVE_KILL && HAVE_GETPID + kill(getpid(), SIGSEGV); +#else + exit(1); +#endif + } - HANDLE_BLOCK_INTERRUPTIONS(); - p = _emalloc(final_size ZEND_FILE_LINE_RELAY_CC ZEND_FILE_LINE_ORIG_RELAY_CC); - if (!p) { - HANDLE_UNBLOCK_INTERRUPTIONS(); - return (void *) p; + p = (char *) _emalloc(_size ZEND_FILE_LINE_RELAY_CC ZEND_FILE_LINE_ORIG_RELAY_CC); + if (p) { + memset(p, 0, _size); } - memset(p, 0, final_size); - HANDLE_UNBLOCK_INTERRUPTIONS(); - return p; + + return ((void *)p); } ZEND_API void *_erealloc(void *ptr, size_t size, int allow_failure ZEND_FILE_LINE_DC ZEND_FILE_LINE_ORIG_DC) { +#if HARDENED_PHP_MM_PROTECT + unsigned int canary_2; +#endif zend_mem_header *p; zend_mem_header *orig; DECLARE_CACHE_VARS(); @@ -319,6 +374,14 @@ p = orig = (zend_mem_header *) ((char *)ptr-sizeof(zend_mem_header)-MEM_HEADER_PADDING); +#if HARDENED_PHP_MM_PROTECT + canary_2 = *(unsigned int *)(((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + p->size + END_MAGIC_SIZE); + if (p->canary != HG(canary_1) || canary_2 != HG(canary_2)) { + zend_security_log("canary mismatch on erealloc() - heap overflow detected"); + exit(1); + } +#endif + #if defined(ZTS) && TSRM_DEBUG if (p->thread_id != tsrm_thread_id()) { void *new_p; @@ -342,7 +405,7 @@ } #endif REMOVE_POINTER_FROM_LIST(p); - p = (zend_mem_header *) ZEND_DO_REALLOC(p, sizeof(zend_mem_header)+MEM_HEADER_PADDING+SIZE+END_MAGIC_SIZE); + p = (zend_mem_header *) ZEND_DO_REALLOC(p, sizeof(zend_mem_header)+MEM_HEADER_PADDING+SIZE+END_MAGIC_SIZE+CANARY_SIZE); if (!p) { if (!allow_failure) { fprintf(stderr,"FATAL: erealloc(): Unable to allocate %ld bytes\n", (long) size); @@ -364,6 +427,9 @@ memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size), &mem_block_end_magic, sizeof(long)); #endif +#if HARDENED_PHP_MM_PROTECT + memcpy((((char *) p) + sizeof(zend_mem_header) + MEM_HEADER_PADDING + size + END_MAGIC_SIZE), &HG(canary_2), CANARY_SIZE); +#endif p->size = size; HANDLE_UNBLOCK_INTERRUPTIONS(); @@ -439,6 +505,10 @@ { AG(head) = NULL; +#if HARDENED_PHP_MM_PROTECT + HG(canary_1) = zend_canary(); + HG(canary_2) = zend_canary(); +#endif #if MEMORY_LIMIT AG(memory_limit) = 1<<30; /* ridiculous limit, effectively no limit */ AG(allocated_memory) = 0; diff -Nur php-5.0.4/Zend/zend_alloc.h hardened-php-5.0.4-0.2.7/Zend/zend_alloc.h --- php-5.0.4/Zend/zend_alloc.h 2004-08-11 08:13:12.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/Zend/zend_alloc.h 2005-04-07 02:04:38.000000000 +0200 @@ -35,6 +35,9 @@ #define MEM_BLOCK_CACHED_MAGIC 0xFB8277DCL typedef struct _zend_mem_header { +#if HARDENED_PHP_MM_PROTECT + unsigned int canary; +#endif #if ZEND_DEBUG long magic; char *filename; diff -Nur php-5.0.4/Zend/zend_builtin_functions.c hardened-php-5.0.4-0.2.7/Zend/zend_builtin_functions.c --- php-5.0.4/Zend/zend_builtin_functions.c 2005-03-14 10:13:14.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_builtin_functions.c 2005-04-07 02:04:38.000000000 +0200 @@ -52,6 +52,9 @@ static ZEND_FUNCTION(crash); #endif #endif +#if HARDENED_PHP_MM_PROTECT_DEBUG +static ZEND_FUNCTION(heap_overflow); +#endif static ZEND_FUNCTION(get_included_files); static ZEND_FUNCTION(is_subclass_of); static ZEND_FUNCTION(is_a); @@ -111,6 +114,9 @@ ZEND_FE(crash, NULL) #endif #endif +#if HARDENED_PHP_MM_PROTECT_DEBUG + ZEND_FE(heap_overflow, NULL) +#endif ZEND_FE(get_included_files, NULL) ZEND_FALIAS(get_required_files, get_included_files, NULL) ZEND_FE(is_subclass_of, NULL) @@ -999,6 +1005,19 @@ #endif /* ZEND_DEBUG */ + +#if HARDENED_PHP_MM_PROTECT_DEBUG +ZEND_FUNCTION(heap_overflow) +{ + char *nowhere = emalloc(10); + + memcpy(nowhere, "something1234567890", sizeof("something1234567890")); + + efree(nowhere); +} +#endif + + /* {{{ proto array get_included_files(void) Returns an array with the file names that were include_once()'d */ ZEND_FUNCTION(get_included_files) diff -Nur php-5.0.4/Zend/zend_canary.c hardened-php-5.0.4-0.2.7/Zend/zend_canary.c --- php-5.0.4/Zend/zend_canary.c 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_canary.c 2005-04-07 02:04:38.000000000 +0200 @@ -0,0 +1,58 @@ +/* + +----------------------------------------------------------------------+ + | Hardened-PHP | + +----------------------------------------------------------------------+ + | Copyright (c) 2004 Stefan Esser | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: Stefan Esser | + +----------------------------------------------------------------------+ + */ +/* $Id: zend_canary.c,v 1.1 2004/11/26 12:45:41 ionic Exp $ */ + +#include "zend.h" + +#include +#include + + +#if HARDENED_PHP_MM_PROTECT || HARDENED_PHP_LL_PROTECT || HARDENED_PHP_HASH_PROTECT + +/* will be replaced later with more compatible method */ +ZEND_API unsigned int zend_canary() +{ + time_t t; + unsigned int canary; + int fd; + + fd = open("/dev/urandom", 0); + if (fd != -1) { + int r = read(fd, &canary, sizeof(canary)); + close(fd); + if (r == sizeof(canary)) { + return (canary); + } + } + /* not good but we never want to do this */ + time(&t); + canary = *(unsigned int *)&t + getpid() << 16; + return (canary); +} +#endif + + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * End: + * vim600: sw=4 ts=4 fdm=marker + * vim<600: sw=4 ts=4 + */ diff -Nur php-5.0.4/Zend/zend_execute.c hardened-php-5.0.4-0.2.7/Zend/zend_execute.c --- php-5.0.4/Zend/zend_execute.c 2005-03-21 17:22:10.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_execute.c 2005-04-07 02:04:38.000000000 +0200 @@ -3523,7 +3523,12 @@ int dummy = 1; zend_file_handle file_handle; +#if HARDENED_PHP_INC_PROTECT + if (zend_is_valid_include(inc_filename) + && (SUCCESS == zend_stream_open(inc_filename->value.str.val, &file_handle TSRMLS_CC))) { +#else if (SUCCESS == zend_stream_open(inc_filename->value.str.val, &file_handle TSRMLS_CC)) { +#endif if (!file_handle.opened_path) { file_handle.opened_path = estrndup(inc_filename->value.str.val, inc_filename->value.str.len); @@ -3548,6 +3553,11 @@ break; case ZEND_INCLUDE: case ZEND_REQUIRE: +#if HARDENED_PHP_INC_PROTECT + if (!zend_is_valid_include(inc_filename)) { + break; + } +#endif new_op_array = compile_filename(opline->op2.u.constant.value.lval, inc_filename TSRMLS_CC); break; case ZEND_EVAL: { diff -Nur php-5.0.4/Zend/zend_extensions.h hardened-php-5.0.4-0.2.7/Zend/zend_extensions.h --- php-5.0.4/Zend/zend_extensions.h 2004-11-25 21:26:48.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_extensions.h 2005-04-07 02:04:38.000000000 +0200 @@ -24,10 +24,11 @@ #include "zend_compile.h" -/* The first number is the engine version and the rest is the date. +/* The first number is a flag saying that Hardened-PHP is used + * the second number is the engine version and the rest is the date. * This way engine 2 API no. is always greater than engine 1 API no.. */ -#define ZEND_EXTENSION_API_NO 220040412 +#define ZEND_EXTENSION_API_NO 1220040412 typedef struct _zend_extension_version_info { int zend_extension_api_no; diff -Nur php-5.0.4/Zend/zend_hash.c hardened-php-5.0.4-0.2.7/Zend/zend_hash.c --- php-5.0.4/Zend/zend_hash.c 2004-07-10 09:45:49.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/Zend/zend_hash.c 2005-04-07 02:06:13.000000000 +0200 @@ -21,6 +21,18 @@ #include "zend.h" +#if HARDENED_PHP_HASH_PROTECT + unsigned int zend_hash_canary = 0x1234567; + zend_bool zend_hash_canary_inited = 0; +#endif + +#define CHECK_HASH_CANARY(hash) \ + if (zend_hash_canary != (hash)->canary) { \ + zend_security_log("Zend HashTable canary was overwritten"); \ + exit(1); \ + } + + #define CONNECT_TO_BUCKET_DLLIST(element, list_head) \ (element)->pNext = (list_head); \ (element)->pLast = NULL; \ @@ -138,6 +150,9 @@ { uint i = 3; Bucket **tmp; +#if HARDENED_PHP_HASH_PROTECT + TSRMLS_FETCH(); +#endif SET_INCONSISTENT(HT_OK); @@ -147,6 +162,13 @@ ht->nTableSize = 1 << i; ht->nTableMask = ht->nTableSize - 1; +#if HARDENED_PHP_HASH_PROTECT + if (zend_hash_canary_inited==0) { + zend_hash_canary = zend_canary(); + zend_hash_canary_inited = 1; + } + ht->canary = zend_hash_canary; +#endif ht->pDestructor = pDestructor; ht->arBuckets = NULL; ht->pListHead = NULL; @@ -226,6 +248,9 @@ } #endif if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(p->pData); } UPDATE_DATA(ht, p, pData, nDataSize); @@ -291,6 +316,9 @@ } #endif if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(p->pData); } UPDATE_DATA(ht, p, pData, nDataSize); @@ -366,6 +394,9 @@ } #endif if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(p->pData); } UPDATE_DATA(ht, p, pData, nDataSize); @@ -414,7 +445,7 @@ IS_CONSISTENT(ht); if ((ht->nTableSize << 1) > 0) { /* Let's double the table size */ - t = (Bucket **) perealloc_recoverable(ht->arBuckets, (ht->nTableSize << 1) * sizeof(Bucket *), ht->persistent); + t = (Bucket **) perealloc(ht->arBuckets, (ht->nTableSize << 1) * sizeof(Bucket *), ht->persistent); if (t) { HANDLE_BLOCK_INTERRUPTIONS(); ht->arBuckets = t; @@ -424,6 +455,7 @@ HANDLE_UNBLOCK_INTERRUPTIONS(); return SUCCESS; } + zend_error(E_ERROR, "zend_hash_do_resize - out of memory"); return FAILURE; } return SUCCESS; @@ -487,6 +519,9 @@ ht->pInternalPointer = p->pListNext; } if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(p->pData); } if (!p->pDataPtr) { @@ -516,6 +551,9 @@ q = p; p = p->pListNext; if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(q->pData); } if (!q->pDataPtr && q->pData) { @@ -542,6 +580,9 @@ q = p; p = p->pListNext; if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(q->pData); } if (!q->pDataPtr && q->pData) { @@ -571,6 +612,9 @@ HANDLE_BLOCK_INTERRUPTIONS(); if (ht->pDestructor) { +#if HARDENED_PHP_HASH_PROTECT + CHECK_HASH_CANARY(ht); +#endif ht->pDestructor(p->pData); } if (!p->pDataPtr) { diff -Nur php-5.0.4/Zend/zend_hash.h hardened-php-5.0.4-0.2.7/Zend/zend_hash.h --- php-5.0.4/Zend/zend_hash.h 2004-01-08 18:31:47.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_hash.h 2005-04-07 02:04:38.000000000 +0200 @@ -58,6 +58,9 @@ } Bucket; typedef struct _hashtable { +#if HARDENED_PHP_HASH_PROTECT + unsigned int canary; +#endif uint nTableSize; uint nTableMask; uint nNumOfElements; diff -Nur php-5.0.4/Zend/zend_llist.c hardened-php-5.0.4-0.2.7/Zend/zend_llist.c --- php-5.0.4/Zend/zend_llist.c 2004-01-08 18:31:47.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_llist.c 2005-04-07 02:04:38.000000000 +0200 @@ -22,9 +22,34 @@ #include "zend.h" #include "zend_llist.h" #include "zend_qsort.h" +#include "zend_globals.h" + +#define CHECK_LIST_CANARY(list) \ + if (HG(canary_3) != (list)->canary_h || HG(canary_4) != (list)->canary_t) { \ + zend_security_log("linked list canary was overwritten"); \ + exit(1); \ + } + +#define CHECK_LISTELEMENT_CANARY(elem) \ + if (HG(canary_3) != (elem)->canary) { \ + zend_security_log("linked list element canary was overwritten"); \ + exit(1); \ + } + ZEND_API void zend_llist_init(zend_llist *l, size_t size, llist_dtor_func_t dtor, unsigned char persistent) { +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + + if (!HG(ll_canary_inited)) { + HG(canary_3) = zend_canary(); + HG(canary_4) = zend_canary(); + HG(ll_canary_inited) = 1; + } + l->canary_h = HG(canary_3); + l->canary_t = HG(canary_4); +#endif l->head = NULL; l->tail = NULL; l->count = 0; @@ -38,6 +63,11 @@ { zend_llist_element *tmp = pemalloc(sizeof(zend_llist_element)+l->size-1, l->persistent); +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) + tmp->canary = HG(canary_3); +#endif tmp->prev = l->tail; tmp->next = NULL; if (l->tail) { @@ -56,6 +86,11 @@ { zend_llist_element *tmp = pemalloc(sizeof(zend_llist_element)+l->size-1, l->persistent); +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) + tmp->canary = HG(canary_3); +#endif tmp->next = l->head; tmp->prev = NULL; if (l->head) { @@ -93,10 +128,20 @@ zend_llist_element *current=l->head; zend_llist_element *next; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif while (current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(current) +#endif next = current->next; if (compare(current->data, element)) { DEL_LLIST_ELEMENT(current, l); +#if HARDENED_PHP_LL_PROTECT + current->canary = 0; +#endif break; } current = next; @@ -108,7 +153,14 @@ { zend_llist_element *current=l->head, *next; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif while (current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(current) +#endif next = current->next; if (l->dtor) { l->dtor(current->data); @@ -133,7 +185,14 @@ zend_llist_element *old_tail; void *data; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif if ((old_tail = l->tail)) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(old_tail) +#endif if (l->tail->prev) { l->tail->prev->next = NULL; } @@ -159,9 +218,16 @@ { zend_llist_element *ptr; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(src) +#endif zend_llist_init(dst, src->size, src->dtor, src->persistent); ptr = src->head; while (ptr) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(ptr) +#endif zend_llist_add_element(dst, ptr->data); ptr = ptr->next; } @@ -172,11 +238,21 @@ { zend_llist_element *element, *next; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif element=l->head; while (element) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(element) +#endif next = element->next; if (func(element->data)) { DEL_LLIST_ELEMENT(element, l); +#if HARDENED_PHP_LL_PROTECT + element->canary = 0; +#endif } element = next; } @@ -187,7 +263,13 @@ { zend_llist_element *element; +#if HARDENED_PHP_LL_PROTECT + CHECK_LIST_CANARY(l) +#endif for (element=l->head; element; element=element->next) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(element) +#endif func(element->data TSRMLS_CC); } } @@ -199,6 +281,9 @@ zend_llist_element **elements; zend_llist_element *element, **ptr; +#if HARDENED_PHP_LL_PROTECT + CHECK_LIST_CANARY(l) +#endif if (l->count <= 0) { return; } @@ -208,6 +293,9 @@ ptr = &elements[0]; for (element=l->head; element; element=element->next) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(element) +#endif *ptr++ = element; } @@ -230,7 +318,13 @@ { zend_llist_element *element; +#if HARDENED_PHP_LL_PROTECT + CHECK_LIST_CANARY(l) +#endif for (element=l->head; element; element=element->next) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(element) +#endif func(element->data, arg TSRMLS_CC); } } @@ -241,8 +335,14 @@ zend_llist_element *element; va_list args; +#if HARDENED_PHP_LL_PROTECT + CHECK_LIST_CANARY(l) +#endif va_start(args, num_args); for (element=l->head; element; element=element->next) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(element) +#endif func(element->data, num_args, args TSRMLS_CC); } va_end(args); @@ -251,6 +351,10 @@ ZEND_API int zend_llist_count(zend_llist *l) { +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif return l->count; } @@ -259,8 +363,15 @@ { zend_llist_position *current = pos ? pos : &l->traverse_ptr; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif *current = l->head; if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif return (*current)->data; } else { return NULL; @@ -272,8 +383,15 @@ { zend_llist_position *current = pos ? pos : &l->traverse_ptr; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif *current = l->tail; if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif return (*current)->data; } else { return NULL; @@ -285,9 +403,19 @@ { zend_llist_position *current = pos ? pos : &l->traverse_ptr; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif *current = (*current)->next; if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif return (*current)->data; } } @@ -299,9 +427,19 @@ { zend_llist_position *current = pos ? pos : &l->traverse_ptr; +#if HARDENED_PHP_LL_PROTECT + TSRMLS_FETCH(); + CHECK_LIST_CANARY(l) +#endif if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif *current = (*current)->prev; if (*current) { +#if HARDENED_PHP_LL_PROTECT + CHECK_LISTELEMENT_CANARY(*current) +#endif return (*current)->data; } } diff -Nur php-5.0.4/Zend/zend_llist.h hardened-php-5.0.4-0.2.7/Zend/zend_llist.h --- php-5.0.4/Zend/zend_llist.h 2004-01-08 18:31:47.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_llist.h 2005-04-07 02:04:38.000000000 +0200 @@ -23,6 +23,9 @@ #define ZEND_LLIST_H typedef struct _zend_llist_element { +#if HARDENED_PHP_LL_PROTECT + unsigned int canary; +#endif struct _zend_llist_element *next; struct _zend_llist_element *prev; char data[1]; /* Needs to always be last in the struct */ @@ -35,6 +38,9 @@ typedef void (*llist_apply_func_t)(void * TSRMLS_DC); typedef struct _zend_llist { +#if HARDENED_PHP_LL_PROTECT + unsigned int canary_h; /* head */ +#endif zend_llist_element *head; zend_llist_element *tail; size_t count; @@ -42,6 +48,9 @@ llist_dtor_func_t dtor; unsigned char persistent; zend_llist_element *traverse_ptr; +#if HARDENED_PHP_LL_PROTECT + unsigned int canary_t; /* tail */ +#endif } zend_llist; typedef zend_llist_element* zend_llist_position; diff -Nur php-5.0.4/Zend/zend_modules.h hardened-php-5.0.4-0.2.7/Zend/zend_modules.h --- php-5.0.4/Zend/zend_modules.h 2005-03-16 00:47:12.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/Zend/zend_modules.h 2005-04-07 02:04:38.000000000 +0200 @@ -38,7 +38,7 @@ extern struct _zend_arg_info fourth_arg_force_ref[5]; extern struct _zend_arg_info all_args_by_ref[1]; -#define ZEND_MODULE_API_NO 20041030 +#define ZEND_MODULE_API_NO 1020041030 #ifdef ZTS #define USING_ZTS 1 #else diff -Nur php-5.0.4/acinclude.m4 hardened-php-5.0.4-0.2.7/acinclude.m4 --- php-5.0.4/acinclude.m4 2005-01-25 14:02:45.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/acinclude.m4 2005-04-07 02:04:39.000000000 +0200 @@ -1169,6 +1169,36 @@ fi ]) +dnl +dnl Check for broken realpath() +dnl +dnl realpath("/etc/hosts/../passwd",XXX) should not return +dnl "/etc/passwd" +dnl +AC_DEFUN([PHP_AC_BROKEN_REALPATH],[ + AC_CACHE_CHECK(whether realpath is broken, ac_cv_broken_realpath,[ + AC_TRY_RUN([ +main() { + char buf[4096+1]; + buf[0] = 0; + realpath("/etc/hosts/../passwd", buf); + exit(strcmp(buf, "/etc/passwd")==0); +} + ],[ + ac_cv_broken_realpath=no + ],[ + ac_cv_broken_realpath=yes + ],[ + ac_cv_broken_realpath=no + ]) + ]) + if test "$ac_cv_broken_realpath" = "yes"; then + AC_DEFINE(PHP_BROKEN_REALPATH, 1, [Whether realpath is broken]) + else + AC_DEFINE(PHP_BROKEN_REALPATH, 0, [Whether realpath is broken]) + fi +]) + dnl PHP_SHARED_MODULE(module-name, object-var, build-dir, cxx) dnl dnl Basically sets up the link-stage for building module-name diff -Nur php-5.0.4/configure hardened-php-5.0.4-0.2.7/configure --- php-5.0.4/configure 2005-04-03 11:42:50.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/configure 2005-04-07 02:04:39.000000000 +0200 @@ -401,6 +401,16 @@ ac_default_prefix=/usr/local # Any additions from configure.in: ac_help="$ac_help + --disable-hardened-php-mm-protect Disable the Memory Manager protection." +ac_help="$ac_help + --disable-hardened-php-ll-protect Disable the Linked List protection." +ac_help="$ac_help + --disable-hardened-php-inc-protect Disable include/require protection." +ac_help="$ac_help + --disable-hardened-php-fmt-protect Disable format string protection." +ac_help="$ac_help + --disable-hardened-php-hash-protect Disable Zend HashTable DTOR protection." +ac_help="$ac_help SAPI modules: " @@ -857,6 +867,8 @@ ac_help="$ac_help --disable-tokenizer Disable tokenizer support" ac_help="$ac_help + --disable-varfilter Disable Hardened-PHP's variable filter" +ac_help="$ac_help --enable-wddx Enable WDDX support." ac_help="$ac_help --disable-xml Disable XML support." @@ -2749,6 +2761,157 @@ +# Check whether --enable-hardened-php-mm-protect or --disable-hardened-php-mm-protect was given. +if test "${enable_hardened_php_mm_protect+set}" = set; then + enableval="$enable_hardened_php_mm_protect" + + DO_HARDENED_PHP_MM_PROTECT=$enableval + +else + + DO_HARDENED_PHP_MM_PROTECT=yes + +fi + + +# Check whether --enable-hardened-php-ll-protect or --disable-hardened-php-ll-protect was given. +if test "${enable_hardened_php_ll_protect+set}" = set; then + enableval="$enable_hardened_php_ll_protect" + + DO_HARDENED_PHP_LL_PROTECT=$enableval + +else + + DO_HARDENED_PHP_LL_PROTECT=yes + +fi + + +# Check whether --enable-hardened-php-inc-protect or --disable-hardened-php-inc-protect was given. +if test "${enable_hardened_php_inc_protect+set}" = set; then + enableval="$enable_hardened_php_inc_protect" + + DO_HARDENED_PHP_INC_PROTECT=$enableval + +else + + DO_HARDENED_PHP_INC_PROTECT=yes + +fi + + +# Check whether --enable-hardened-php-fmt-protect or --disable-hardened-php-fmt-protect was given. +if test "${enable_hardened_php_fmt_protect+set}" = set; then + enableval="$enable_hardened_php_fmt_protect" + + DO_HARDENED_PHP_FMT_PROTECT=$enableval + +else + + DO_HARDENED_PHP_FMT_PROTECT=yes + +fi + + +# Check whether --enable-hardened-php-hash-protect or --disable-hardened-php-hash-protect was given. +if test "${enable_hardened_php_hash_protect+set}" = set; then + enableval="$enable_hardened_php_hash_protect" + + DO_HARDENED_PHP_HASH_PROTECT=$enableval + +else + + DO_HARDENED_PHP_HASH_PROTECT=yes + +fi + + +echo $ac_n "checking whether to protect the Zend Memory Manager""... $ac_c" 1>&6 +echo "configure:2725: checking whether to protect the Zend Memory Manager" >&5 +echo "$ac_t""$DO_HARDENED_PHP_MM_PROTECT" 1>&6 + +echo $ac_n "checking whether to protect the Zend Linked Lists""... $ac_c" 1>&6 +echo "configure:2729: checking whether to protect the Zend Linked Lists" >&5 +echo "$ac_t""$DO_HARDENED_PHP_LL_PROTECT" 1>&6 + +echo $ac_n "checking whether to protect include/require statements""... $ac_c" 1>&6 +echo "configure:2733: checking whether to protect include/require statements" >&5 +echo "$ac_t""$DO_HARDENED_PHP_INC_PROTECT" 1>&6 + +echo $ac_n "checking whether to protect PHP Format String functions""... $ac_c" 1>&6 +echo "configure:2737: checking whether to protect PHP Format String functions" >&5 +echo "$ac_t""$DO_HARDENED_PHP_FMT_PROTECT" 1>&6 + +echo $ac_n "checking whether to protect the Zend HashTable Destructors""... $ac_c" 1>&6 +echo "configure:2737: checking whether to protect the Zend HashTable Destructors" >&5 +echo "$ac_t""$DO_HARDENED_PHP_HASH_PROTECT" 1>&6 + + +cat >> confdefs.h <<\EOF +#define HARDENED_PHP 1 +EOF + + + +if test "$DO_HARDENED_PHP_MM_PROTECT" = "yes"; then + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_MM_PROTECT 1 +EOF + +else + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_MM_PROTECT 0 +EOF + +fi + +if test "$DO_HARDENED_PHP_LL_PROTECT" = "yes"; then + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_LL_PROTECT 1 +EOF + +else + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_LL_PROTECT 0 +EOF + +fi + +if test "$DO_HARDENED_PHP_INC_PROTECT" = "yes"; then + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_INC_PROTECT 1 +EOF + +else + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_INC_PROTECT 0 +EOF + +fi + +if test "$DO_HARDENED_PHP_FMT_PROTECT" = "yes"; then + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_FMT_PROTECT 1 +EOF + +else + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_FMT_PROTECT 0 +EOF + +fi + +if test "$DO_HARDENED_PHP_HASH_PROTECT" = "yes"; then + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_HASH_PROTECT 1 +EOF + +else + cat >> confdefs.h <<\EOF +#define HARDENED_PHP_HASH_PROTECT 0 +EOF + +fi @@ -17390,6 +17553,62 @@ fi + echo $ac_n "checking whether realpath is broken""... $ac_c" 1>&6 +echo "configure:14928: checking whether realpath is broken" >&5 +if eval "test \"`echo '$''{'ac_cv_broken_realpath'+set}'`\" = set"; then + echo $ac_n "(cached) $ac_c" 1>&6 +else + + if test "$cross_compiling" = yes; then + + ac_cv_broken_realpath=no + +else + cat > conftest.$ac_ext <&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext} && (./conftest; exit) 2>/dev/null +then + + ac_cv_broken_realpath=no + +else + echo "configure: failed program was:" >&5 + cat conftest.$ac_ext >&5 + rm -fr conftest* + + ac_cv_broken_realpath=yes + +fi +rm -fr conftest* +fi + + +fi + +echo "$ac_t""$ac_cv_broken_realpath" 1>&6 + if test "$ac_cv_broken_realpath" = "yes"; then + cat >> confdefs.h <<\EOF +#define PHP_BROKEN_REALPATH 1 +EOF + + else + cat >> confdefs.h <<\EOF +#define PHP_BROKEN_REALPATH 0 +EOF + + fi + + echo $ac_n "checking for declared timezone""... $ac_c" 1>&6 echo "configure:17395: checking for declared timezone" >&5 if eval "test \"`echo '$''{'ac_cv_declared_timezone'+set}'`\" = set"; then @@ -86878,6 +87097,265 @@ fi +echo $ac_n "checking whether to enable Hardened-PHP's variable filter""... $ac_c" 1>&6 +echo "configure:82041: checking whether to enable Hardened-PHP's variable filter" >&5 +# Check whether --enable-varfilter or --disable-varfilter was given. +if test "${enable_varfilter+set}" = set; then + enableval="$enable_varfilter" + PHP_VARFILTER=$enableval +else + + PHP_VARFILTER=yes + + if test "$PHP_ENABLE_ALL" && test "yes" = "yes"; then + PHP_VARFILTER=$PHP_ENABLE_ALL + fi + +fi + + + +ext_output="yes, shared" +ext_shared=yes +case $PHP_VARFILTER in +shared,*) + PHP_VARFILTER=`echo "$PHP_VARFILTER"|sed 's/^shared,//'` + ;; +shared) + PHP_VARFILTER=yes + ;; +no) + ext_output=no + ext_shared=no + ;; +*) + ext_output=yes + ext_shared=no + ;; +esac + + + +echo "$ac_t""$ext_output" 1>&6 + + + + +if test "$PHP_VARFILTER" != "no"; then + cat >> confdefs.h <<\EOF +#define HAVE_VARFILTER 1 +EOF + + + ext_builddir=ext/varfilter + ext_srcdir=$abs_srcdir/ext/varfilter + + ac_extra= + + if test "$ext_shared" != "shared" && test "$ext_shared" != "yes" && test "" != "cli"; then + + + + case ext/varfilter in + "") ac_srcdir="$abs_srcdir/"; unset ac_bdir; ac_inc="-I. -I$abs_srcdir" ;; + /*) ac_srcdir=`echo "ext/varfilter"|cut -c 2-`"/"; ac_bdir=$ac_srcdir; ac_inc="-I$ac_bdir -I$abs_srcdir/$ac_bdir" ;; + *) ac_srcdir="$abs_srcdir/ext/varfilter/"; ac_bdir="ext/varfilter/"; ac_inc="-I$ac_bdir -I$ac_srcdir" ;; + esac + + + + b_c_pre=$php_c_pre + b_cxx_pre=$php_cxx_pre + b_c_meta=$php_c_meta + b_cxx_meta=$php_cxx_meta + b_c_post=$php_c_post + b_cxx_post=$php_cxx_post + b_lo=$php_lo + + + old_IFS=$IFS + for ac_src in varfilter.c; do + + IFS=. + set $ac_src + ac_obj=$1 + IFS=$old_IFS + + PHP_GLOBAL_OBJS="$PHP_GLOBAL_OBJS $ac_bdir$ac_obj.lo" + + case $ac_src in + *.c) ac_comp="$b_c_pre $ac_extra $ac_inc $b_c_meta -c $ac_srcdir$ac_src -o $ac_bdir$ac_obj.$b_lo $b_c_post" ;; + *.cpp) ac_comp="$b_cxx_pre $ac_extra $ac_inc $b_cxx_meta -c $ac_srcdir$ac_src -o $ac_bdir$ac_obj.$b_lo $b_cxx_post" ;; + esac + + cat >>Makefile.objects<>Makefile.objects<>Makefile.objects<> confdefs.h <>Makefile.objects<>Makefile.objects<&6 @@ -97351,7 +97829,7 @@ php_ini.c SAPI.c rfc1867.c php_content_types.c strlcpy.c \ strlcat.c mergesort.c reentrancy.c php_variables.c php_ticks.c \ network.c php_open_temporary_file.c php_logos.c \ - output.c ; do + output.c hardened_php.c ; do IFS=. set $ac_src @@ -97579,7 +98057,7 @@ zend_variables.c zend.c zend_API.c zend_extensions.c zend_hash.c \ zend_list.c zend_indent.c zend_builtin_functions.c zend_sprintf.c \ zend_ini.c zend_qsort.c zend_multibyte.c zend_ts_hash.c zend_stream.c \ - zend_iterators.c zend_interfaces.c zend_exceptions.c zend_strtod.c; do + zend_iterators.c zend_interfaces.c zend_exceptions.c zend_strtod.c zend_canary.c; do IFS=. set $ac_src diff -Nur php-5.0.4/configure.in hardened-php-5.0.4-0.2.7/configure.in --- php-5.0.4/configure.in 2005-03-30 23:43:12.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/configure.in 2005-04-07 02:04:39.000000000 +0200 @@ -235,7 +235,7 @@ sinclude(Zend/acinclude.m4) sinclude(Zend/Zend.m4) sinclude(TSRM/tsrm.m4) - +sinclude(main/hardened_php.m4) divert(2) @@ -620,6 +620,7 @@ AC_FUNC_ALLOCA dnl PHP_AC_BROKEN_SPRINTF dnl PHP_AC_BROKEN_SNPRINTF +PHP_AC_BROKEN_REALPATH PHP_DECLARED_TIMEZONE PHP_TIME_R_TYPE PHP_READDIR_R_TYPE @@ -1262,7 +1263,7 @@ php_ini.c SAPI.c rfc1867.c php_content_types.c strlcpy.c \ strlcat.c mergesort.c reentrancy.c php_variables.c php_ticks.c \ network.c php_open_temporary_file.c php_logos.c \ - output.c ) + output.c hardened_php.c ) PHP_ADD_SOURCES(main/streams, streams.c cast.c memory.c filter.c \ plain_wrapper.c userspace.c transports.c xp_socket.c mmap.c) @@ -1280,7 +1281,7 @@ zend_variables.c zend.c zend_API.c zend_extensions.c zend_hash.c \ zend_list.c zend_indent.c zend_builtin_functions.c zend_sprintf.c \ zend_ini.c zend_qsort.c zend_multibyte.c zend_ts_hash.c zend_stream.c \ - zend_iterators.c zend_interfaces.c zend_exceptions.c zend_strtod.c) + zend_iterators.c zend_interfaces.c zend_exceptions.c zend_strtod.c zend_canary.c ) if test -r "$abs_srcdir/Zend/zend_objects.c"; then PHP_ADD_SOURCES(Zend, zend_objects.c zend_object_handlers.c zend_objects_API.c zend_mm.c \ diff -Nur php-5.0.4/ext/standard/array.c hardened-php-5.0.4-0.2.7/ext/standard/array.c --- php-5.0.4/ext/standard/array.c 2005-03-12 11:12:49.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/standard/array.c 2005-04-07 02:04:39.000000000 +0200 @@ -1255,6 +1255,31 @@ } } } + + if (var_name[0] == 'H') { + if ((strcmp(var_name, "HTTP_GET_VARS")==0)|| + (strcmp(var_name, "HTTP_POST_VARS")==0)|| + (strcmp(var_name, "HTTP_POST_FILES")==0)|| + (strcmp(var_name, "HTTP_ENV_VARS")==0)|| + (strcmp(var_name, "HTTP_SERVER_VARS")==0)|| + (strcmp(var_name, "HTTP_SESSION_VARS")==0)|| + (strcmp(var_name, "HTTP_COOKIE_VARS")==0)) { + return 0; + } + } else if (var_name[0] == '_') { + if ((strcmp(var_name, "_COOKIE")==0)|| + (strcmp(var_name, "_ENV")==0)|| + (strcmp(var_name, "_FILES")==0)|| + (strcmp(var_name, "_GET")==0)|| + (strcmp(var_name, "_POST")==0)|| + (strcmp(var_name, "_REQUEST")==0)|| + (strcmp(var_name, "_SESSION")==0)|| + (strcmp(var_name, "_SERVER")==0)) { + return 0; + } + } else if (strcmp(var_name, "GLOBALS")==0) { + return 0; + } return 1; } diff -Nur php-5.0.4/ext/standard/basic_functions.c hardened-php-5.0.4-0.2.7/ext/standard/basic_functions.c --- php-5.0.4/ext/standard/basic_functions.c 2005-03-10 13:10:57.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/standard/basic_functions.c 2005-04-07 02:04:39.000000000 +0200 @@ -617,7 +617,7 @@ PHP_FALIAS(socket_get_status, stream_get_meta_data, NULL) #if (!defined(__BEOS__) && !defined(NETWARE) && HAVE_REALPATH) || defined(ZTS) - PHP_FE(realpath, NULL) + PHP_STATIC_FE("realpath", zif_real_path, NULL) #endif #ifdef HAVE_FNMATCH @@ -3124,6 +3124,34 @@ memcpy(new_key, prefix, prefix_len); memcpy(new_key+prefix_len, hash_key->arKey, hash_key->nKeyLength); + if (new_key[0] == 'H') { + if ((strcmp(new_key, "HTTP_GET_VARS")==0)|| + (strcmp(new_key, "HTTP_POST_VARS")==0)|| + (strcmp(new_key, "HTTP_POST_FILES")==0)|| + (strcmp(new_key, "HTTP_ENV_VARS")==0)|| + (strcmp(new_key, "HTTP_SERVER_VARS")==0)|| + (strcmp(new_key, "HTTP_SESSION_VARS")==0)|| + (strcmp(new_key, "HTTP_COOKIE_VARS")==0)) { + efree(new_key); + return 0; + } + } else if (new_key[0] == '_') { + if ((strcmp(new_key, "_COOKIE")==0)|| + (strcmp(new_key, "_ENV")==0)|| + (strcmp(new_key, "_FILES")==0)|| + (strcmp(new_key, "_GET")==0)|| + (strcmp(new_key, "_POST")==0)|| + (strcmp(new_key, "_REQUEST")==0)|| + (strcmp(new_key, "_SESSION")==0)|| + (strcmp(new_key, "_SERVER")==0)) { + efree(new_key); + return 0; + } + } else if (strcmp(new_key, "GLOBALS")==0) { + efree(new_key); + return 0; + } + zend_hash_del(&EG(symbol_table), new_key, new_key_len); ZEND_SET_SYMBOL_WITH_LENGTH(&EG(symbol_table), new_key, new_key_len, *var, (*var)->refcount+1, 0); diff -Nur php-5.0.4/ext/standard/file.c hardened-php-5.0.4-0.2.7/ext/standard/file.c --- php-5.0.4/ext/standard/file.c 2005-03-27 17:53:30.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/ext/standard/file.c 2005-04-07 02:04:39.000000000 +0200 @@ -2044,7 +2044,7 @@ #if (!defined(__BEOS__) && !defined(NETWARE) && HAVE_REALPATH) || defined(ZTS) /* {{{ proto string realpath(string path) Return the resolved path */ -PHP_FUNCTION(realpath) +PHP_FUNCTION(real_path) { zval **path; char resolved_path_buff[MAXPATHLEN]; diff -Nur php-5.0.4/ext/standard/file.h hardened-php-5.0.4-0.2.7/ext/standard/file.h --- php-5.0.4/ext/standard/file.h 2004-06-21 23:08:05.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/ext/standard/file.h 2005-04-07 02:04:39.000000000 +0200 @@ -60,7 +60,7 @@ PHP_FUNCTION(fd_set); PHP_FUNCTION(fd_isset); #if (!defined(__BEOS__) && !defined(NETWARE) && HAVE_REALPATH) || defined(ZTS) -PHP_FUNCTION(realpath); +PHP_FUNCTION(real_path); PHP_FUNCTION(fnmatch); #endif PHP_NAMED_FUNCTION(php_if_ftruncate); diff -Nur php-5.0.4/ext/standard/info.c hardened-php-5.0.4-0.2.7/ext/standard/info.c --- php-5.0.4/ext/standard/info.c 2004-05-02 15:23:30.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/ext/standard/info.c 2005-04-07 02:04:39.000000000 +0200 @@ -394,7 +394,7 @@ if (flag & PHP_INFO_GENERAL) { char *zend_version = get_zend_version(); - char temp_api[10]; + char temp_api[11]; char *logo_guid; php_uname = php_get_uname('a'); @@ -415,11 +415,22 @@ PUTS("\" alt=\"PHP Logo\" />"); } +#if HARDENED_PHP + if (!sapi_module.phpinfo_as_text) { + php_printf("

Hardened-PHP Version %s/%s

\n", PHP_VERSION, HARDENED_PHP_VERSION); + } else { + char temp_ver[40]; + + snprintf(temp_ver, sizeof(temp_ver), "%s/%s", PHP_VERSION, HARDENED_PHP_VERSION); + php_info_print_table_row(2, "Hardened-PHP Version", temp_ver); + } +#else if (!sapi_module.phpinfo_as_text) { php_printf("

PHP Version %s

\n", PHP_VERSION); } else { php_info_print_table_row(2, "PHP Version", PHP_VERSION); - } + } +#endif php_info_print_box_end(); php_info_print_table_start(); php_info_print_table_row(2, "System", php_uname ); diff -Nur php-5.0.4/ext/varfilter/CREDITS hardened-php-5.0.4-0.2.7/ext/varfilter/CREDITS --- php-5.0.4/ext/varfilter/CREDITS 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/varfilter/CREDITS 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,2 @@ +varfilter +Stefan Esser \ No newline at end of file diff -Nur php-5.0.4/ext/varfilter/config.m4 hardened-php-5.0.4-0.2.7/ext/varfilter/config.m4 --- php-5.0.4/ext/varfilter/config.m4 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/varfilter/config.m4 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,11 @@ +dnl +dnl $Id: config.m4,v 1.1 2004/11/14 13:27:16 ionic Exp $ +dnl + +PHP_ARG_ENABLE(varfilter, whether to enable Hardened-PHP's variable filter, +[ --disable-varfilter Disable Hardened-PHP's variable filter], yes) + +if test "$PHP_VARFILTER" != "no"; then + AC_DEFINE(HAVE_VARFILTER, 1, [ ]) + PHP_NEW_EXTENSION(varfilter, varfilter.c, $ext_shared) +fi diff -Nur php-5.0.4/ext/varfilter/php_varfilter.h hardened-php-5.0.4-0.2.7/ext/varfilter/php_varfilter.h --- php-5.0.4/ext/varfilter/php_varfilter.h 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/varfilter/php_varfilter.h 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,72 @@ +/* + +----------------------------------------------------------------------+ + | PHP Version 4 | + +----------------------------------------------------------------------+ + | Copyright (c) 1997-2003 The PHP Group | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: Stefan Esser | + +----------------------------------------------------------------------+ + + $Id: php_varfilter.h,v 1.1 2004/11/14 13:27:16 ionic Exp $ +*/ + +#ifndef PHP_VARFILTER_H +#define PHP_VARFILTER_H + +extern zend_module_entry varfilter_module_entry; +#define phpext_varfilter_ptr &varfilter_module_entry + +#ifdef PHP_WIN32 +#define PHP_VARFILTER_API __declspec(dllexport) +#else +#define PHP_VARFILTER_API +#endif + +#ifdef ZTS +#include "TSRM.h" +#endif + +#include "SAPI.h" + +PHP_MINIT_FUNCTION(varfilter); +PHP_MSHUTDOWN_FUNCTION(varfilter); +PHP_RINIT_FUNCTION(varfilter); +PHP_RSHUTDOWN_FUNCTION(varfilter); +PHP_MINFO_FUNCTION(varfilter); + + +ZEND_BEGIN_MODULE_GLOBALS(varfilter) + long max_request_variables; + long cur_request_variables; + long max_varname_length; + long max_value_length; + long max_array_depth; +ZEND_END_MODULE_GLOBALS(varfilter) + + +#ifdef ZTS +#define VARFILTER_G(v) TSRMG(varfilter_globals_id, zend_varfilter_globals *, v) +#else +#define VARFILTER_G(v) (varfilter_globals.v) +#endif + +SAPI_INPUT_FILTER_FUNC(varfilter_input_filter); + +#endif /* PHP_VARFILTER_H */ + + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * indent-tabs-mode: t + * End: + */ diff -Nur php-5.0.4/ext/varfilter/varfilter.c hardened-php-5.0.4-0.2.7/ext/varfilter/varfilter.c --- php-5.0.4/ext/varfilter/varfilter.c 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/ext/varfilter/varfilter.c 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,196 @@ +/* + +----------------------------------------------------------------------+ + | PHP Version 4 | + +----------------------------------------------------------------------+ + | Copyright (c) 1997-2003 The PHP Group | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: | + +----------------------------------------------------------------------+ + + $Id: varfilter.c,v 1.1 2004/11/14 13:27:16 ionic Exp $ +*/ + +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif + +#include "php.h" +#include "php_ini.h" +#include "ext/standard/info.h" +#include "php_varfilter.h" +#include "hardened_php.h" + +ZEND_DECLARE_MODULE_GLOBALS(varfilter) + +/* True global resources - no need for thread safety here */ +static int le_varfilter; + +/* {{{ varfilter_module_entry + */ +zend_module_entry varfilter_module_entry = { +#if ZEND_MODULE_API_NO >= 20010901 + STANDARD_MODULE_HEADER, +#endif + "varfilter", + NULL, + PHP_MINIT(varfilter), + PHP_MSHUTDOWN(varfilter), + PHP_RINIT(varfilter), /* Replace with NULL if there's nothing to do at request start */ + PHP_RSHUTDOWN(varfilter), /* Replace with NULL if there's nothing to do at request end */ + PHP_MINFO(varfilter), +#if ZEND_MODULE_API_NO >= 20010901 + "0.2.0", /* Replace with version number for your extension */ +#endif + STANDARD_MODULE_PROPERTIES +}; +/* }}} */ + +#ifdef COMPILE_DL_VARFILTER +ZEND_GET_MODULE(varfilter) +#endif + +/* {{{ PHP_INI + */ +PHP_INI_BEGIN() + STD_PHP_INI_ENTRY("varfilter.max_request_variables", "200", PHP_INI_SYSTEM, OnUpdateLong, max_request_variables, zend_varfilter_globals, varfilter_globals) + STD_PHP_INI_ENTRY("varfilter.max_varname_length", "64", PHP_INI_SYSTEM, OnUpdateLong, max_varname_length, zend_varfilter_globals, varfilter_globals) + STD_PHP_INI_ENTRY("varfilter.max_value_length", "10000", PHP_INI_SYSTEM, OnUpdateLong, max_value_length, zend_varfilter_globals, varfilter_globals) + STD_PHP_INI_ENTRY("varfilter.max_array_depth", "100", PHP_INI_SYSTEM, OnUpdateLong, max_array_depth, zend_varfilter_globals, varfilter_globals) +PHP_INI_END() +/* }}} */ + +/* {{{ php_varfilter_init_globals + */ +static void php_varfilter_init_globals(zend_varfilter_globals *varfilter_globals) +{ + varfilter_globals->max_request_variables = 200; + varfilter_globals->cur_request_variables = 0; + varfilter_globals->max_varname_length = 64; + varfilter_globals->max_value_length = 10000; + varfilter_globals->max_array_depth = 100; +} +/* }}} */ + +/* {{{ PHP_MINIT_FUNCTION + */ +PHP_MINIT_FUNCTION(varfilter) +{ + ZEND_INIT_MODULE_GLOBALS(varfilter, php_varfilter_init_globals, NULL); + REGISTER_INI_ENTRIES(); + + sapi_register_input_filter(varfilter_input_filter); + return SUCCESS; +} +/* }}} */ + +/* {{{ PHP_MSHUTDOWN_FUNCTION + */ +PHP_MSHUTDOWN_FUNCTION(varfilter) +{ + UNREGISTER_INI_ENTRIES(); + + return SUCCESS; +} +/* }}} */ + +/* Remove if there's nothing to do at request start */ +/* {{{ PHP_RINIT_FUNCTION + */ +PHP_RINIT_FUNCTION(varfilter) +{ + VARFILTER_G(cur_request_variables) = 0; + + return SUCCESS; +} +/* }}} */ + +/* Remove if there's nothing to do at request end */ +/* {{{ PHP_RSHUTDOWN_FUNCTION + */ +PHP_RSHUTDOWN_FUNCTION(varfilter) +{ + return SUCCESS; +} +/* }}} */ + +/* {{{ PHP_MINFO_FUNCTION + */ +PHP_MINFO_FUNCTION(varfilter) +{ + php_info_print_table_start(); + php_info_print_table_header(2, "Hardened-PHP's variable filter support", "enabled"); + php_info_print_table_end(); + + DISPLAY_INI_ENTRIES(); +} +/* }}} */ + +/* {{{ SAPI_INPUT_FILTER_FUNC + */ +SAPI_INPUT_FILTER_FUNC(varfilter_input_filter) +{ + char *index; + unsigned int var_len, depth = 0; + + /* Drop this variable if the limit is reached */ + if (VARFILTER_G(max_request_variables) == VARFILTER_G(cur_request_variables)) { + php_security_log("tried to register too many variables"); + return 0; + } + + /* Drop this variable if it exceeds the value length limit */ + if (VARFILTER_G(max_value_length) < val_len) { + php_security_log("tried to register a variable with a too long value"); + return 0; + } + + /* Find length of variable name */ + index = strchr(var, '['); + var_len = index ? index-var : strlen(var); + + /* Drop this variable if it exceeds the varname length limit */ + if (VARFILTER_G(max_varname_length) < var_len) { + php_security_log("tried to register a variable with a too long variable name"); + return 0; + } + + /* Find out array depth */ + while (index) { + depth++; + index = strchr(index+1, '['); + } + + /* Drop this variable if it exceeds the array depth limit */ + if (VARFILTER_G(max_array_depth) < depth) { + php_security_log("tried to register a too deep array variable"); + return 0; + } + + /* Okay let PHP register this variable */ + VARFILTER_G(cur_request_variables)++; + + if (new_val_len) { + *new_val_len = val_len; + } + + return 1; +} +/* }}} */ + + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * End: + * vim600: noet sw=4 ts=4 fdm=marker + * vim<600: noet sw=4 ts=4 + */ diff -Nur php-5.0.4/main/SAPI.c hardened-php-5.0.4-0.2.7/main/SAPI.c --- php-5.0.4/main/SAPI.c 2005-02-22 15:46:15.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/SAPI.c 2005-04-07 02:04:39.000000000 +0200 @@ -821,6 +821,12 @@ zend_hash_del(&known_post_content_types, post_entry->content_type, post_entry->content_type_len+1); } +SAPI_API int sapi_register_input_filter(unsigned int (*input_filter)(int arg, char *var, char **val, unsigned int val_len, unsigned int *new_val_len TSRMLS_DC)) +{ + sapi_module.input_filter = input_filter; + return SUCCESS; +} + SAPI_API int sapi_register_default_post_reader(void (*default_post_reader)(TSRMLS_D)) { @@ -835,11 +841,6 @@ return SUCCESS; } -SAPI_API int sapi_register_input_filter(unsigned int (*input_filter)(int arg, char *var, char **val, unsigned int val_len, unsigned int *new_val_len TSRMLS_DC)) -{ - sapi_module.input_filter = input_filter; - return SUCCESS; -} SAPI_API int sapi_flush(TSRMLS_D) { diff -Nur php-5.0.4/main/SAPI.h hardened-php-5.0.4-0.2.7/main/SAPI.h --- php-5.0.4/main/SAPI.h 2004-01-08 18:33:04.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/SAPI.h 2005-04-07 02:04:39.000000000 +0200 @@ -103,9 +103,14 @@ char *current_user; int current_user_length; - /* this is necessary for CLI module */ - int argc; - char **argv; + /* this is necessary for CLI module */ + int argc; + char **argv; + +#if HARDENED_PHP + /* this is necessary for IP logging */ + char ip_address[64]; +#endif } sapi_request_info; @@ -270,7 +275,11 @@ #define SAPI_DEFAULT_MIMETYPE "text/html" #define SAPI_DEFAULT_CHARSET "" +#if HARDENED_PHP +#define SAPI_PHP_VERSION_HEADER "X-Powered-By: Hardened-PHP/" PHP_VERSION +#else #define SAPI_PHP_VERSION_HEADER "X-Powered-By: PHP/" PHP_VERSION +#endif #define SAPI_POST_READER_FUNC(post_reader) void post_reader(TSRMLS_D) #define SAPI_POST_HANDLER_FUNC(post_handler) void post_handler(char *content_type_dup, void *arg TSRMLS_DC) diff -Nur php-5.0.4/main/fopen_wrappers.c hardened-php-5.0.4-0.2.7/main/fopen_wrappers.c --- php-5.0.4/main/fopen_wrappers.c 2005-03-11 07:55:22.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/fopen_wrappers.c 2005-04-07 02:05:49.000000000 +0200 @@ -163,6 +163,21 @@ char *pathbuf; char *ptr; char *end; + char path_copy[MAXPATHLEN]; + int path_len; + + /* Special case path ends with a trailing slash */ + path_len = strlen(path); + if (path_len >= MAXPATHLEN) { + errno = EPERM; /* we deny permission to open it */ + return -1; + } + if (path_len > 0 && path[path_len-1] == PHP_DIR_SEPARATOR) { + memcpy(path_copy, path, path_len+1); + while (path_len > 0 && path_copy[path_len-1] == PHP_DIR_SEPARATOR) path_len--; + path_copy[path_len] = '\0'; + path = (const char *)&path_copy; + } pathbuf = estrdup(PG(open_basedir)); diff -Nur php-5.0.4/main/hardened_globals.h hardened-php-5.0.4-0.2.7/main/hardened_globals.h --- php-5.0.4/main/hardened_globals.h 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/hardened_globals.h 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,54 @@ +/* + +----------------------------------------------------------------------+ + | Hardened-PHP | + +----------------------------------------------------------------------+ + | Copyright (c) 2004 Stefan Esser | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: Stefan Esser | + +----------------------------------------------------------------------+ + */ + +#ifndef HARDENED_GLOBALS_H +#define HARDENED_GLOBALS_H + +typedef struct _hardened_globals hardened_globals_struct; + +#ifdef ZTS +# define HG(v) TSRMG(hardened_globals_id, hardened_globals_struct *, v) +extern int hardened_globals_id; +#else +# define HG(v) (hardened_globals.v) +extern struct _hardened_globals hardened_globals; +#endif + + +struct _hardened_globals { +#if HARDENED_PHP_MM_PROTECT + unsigned int canary_1; + unsigned int canary_2; +#endif +#if HARDENED_PHP_LL_PROTECT + unsigned int canary_3; + unsigned int canary_4; + unsigned int ll_canary_inited; +#endif + unsigned int dummy; +}; + + +#endif /* HARDENED_GLOBALS_H */ + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * End: + */ diff -Nur php-5.0.4/main/hardened_php.c hardened-php-5.0.4-0.2.7/main/hardened_php.c --- php-5.0.4/main/hardened_php.c 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/hardened_php.c 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,205 @@ +/* + +----------------------------------------------------------------------+ + | Hardened-PHP | + +----------------------------------------------------------------------+ + | Copyright (c) 2004 Stefan Esser | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: Stefan Esser | + +----------------------------------------------------------------------+ + */ +/* $Id: hardened_php.c,v 1.2 2004/11/21 09:38:52 ionic Exp $ */ + +#include "php.h" + +#include +#include + +#if HAVE_UNISTD_H +#include +#endif +#include "SAPI.h" +#include "php_globals.h" + +#if HARDENED_PHP + +#ifdef HAVE_SYS_SOCKET_H +#include +#endif + +#if defined(PHP_WIN32) || defined(__riscos__) || defined(NETWARE) +#undef AF_UNIX +#endif + +#if defined(AF_UNIX) +#include +#endif + +#define SYSLOG_PATH "/dev/log" + +#include "snprintf.h" + +#ifdef ZTS +#include "hardened_globals.h" +int hardened_globals_id; +#else +struct _hardened_globals hardened_globals; +#endif + +static void hardened_globals_ctor(hardened_globals_struct *hardened_globals TSRMLS_DC) +{ + memset(hardened_globals, 0, sizeof(*hardened_globals)); +} + +PHPAPI void hardened_startup() +{ +#ifdef ZTS + ts_allocate_id(&hardened_globals_id, sizeof(hardened_globals_struct), (ts_allocate_ctor) hardened_globals_ctor, NULL); +#else + hardened_globals_ctor(&hardened_globals TSRMLS_CC); +#endif +} + +PHPAPI void php_security_log(char *str) +{ +#if defined(AF_UNIX) + int s, r; + struct sockaddr_un saun; + char buf[1024]; + char *ip_address; + char *fname; + TSRMLS_FETCH(); + + ip_address = sapi_getenv("REMOTE_ADDR", 11 TSRMLS_CC); + if (ip_address == NULL) { + ip_address = "REMOTE_ADDR not set"; + } + + fname = sapi_getenv("SCRIPT_FILENAME", 15 TSRMLS_CC); + + ap_php_snprintf(buf, 1024, "php security-alert: %s (attacker '%s', file '%s')\n", str, ip_address, fname); + + s = socket(AF_UNIX, SOCK_DGRAM, 0); + if (s == -1) { + return; + } + + memset(&saun, 0, sizeof(saun)); + saun.sun_family = AF_UNIX; + strcpy(saun.sun_path, SYSLOG_PATH); + /*saun.sun_len = sizeof(saun);*/ + + r = connect(s, (struct sockaddr *)&saun, sizeof(saun)); + if (r) { + close(s); + s = socket(AF_UNIX, SOCK_STREAM, 0); + if (s == -1) { + return; + } + + memset(&saun, 0, sizeof(saun)); + saun.sun_family = AF_UNIX; + strcpy(saun.sun_path, SYSLOG_PATH); + /*saun.sun_len = sizeof(saun);*/ + + r = connect(s, (struct sockaddr *)&saun, sizeof(saun)); + if (r) { + close(s); + return; + } + } + send(s, buf, strlen(buf), 0); + + close(s); +#endif +} +#endif + +#if HARDENED_PHP_MM_PROTECT || HARDENED_PHP_LL_PROTECT || HARDENED_PHP_HASH_PROTECT + +/* will be replaced later with more compatible method */ +PHPAPI unsigned int php_canary() +{ + time_t t; + unsigned int canary; + int fd; + + fd = open("/dev/urandom", 0); + if (fd != -1) { + int r = read(fd, &canary, sizeof(canary)); + close(fd); + if (r == sizeof(canary)) { + return (canary); + } + } + /* not good but we never want to do this */ + time(&t); + canary = *(unsigned int *)&t + getpid() << 16; + return (canary); +} +#endif + +#if HARDENED_PHP_INC_PROTECT + +PHPAPI int php_is_valid_include(zval *z) +{ + char *filename; + int len; + TSRMLS_FETCH(); + + /* must be of type string */ + if (z->type != IS_STRING || z->value.str.val == NULL) { + return (0); + } + + /* short cut */ + filename = z->value.str.val; + len = z->value.str.len; + + /* 1. must be shorter than MAXPATHLEN */ + if (len > MAXPATHLEN) { + php_security_log("Include filename longer than MAXPATHLEN chars"); + return (0); + } + + /* 2. must not be cutted */ + if (len != strlen(filename)) { + php_security_log("Include filename has a \\0 cut"); + return (0); + } + + /* 3. must not be a URL */ + if (strstr(filename, "://")) { + php_security_log("Include filename is an URL"); + return (0); + } + + /* 4. must not be an uploaded file */ + if (SG(rfc1867_uploaded_files)) { + if (zend_hash_exists(SG(rfc1867_uploaded_files), (char *) filename, len+1)) { + php_security_log("Include filename is an uploaded file"); + return (0); + } + } + + /* passed all tests */ + return (1); +} + +#endif + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * End: + * vim600: sw=4 ts=4 fdm=marker + * vim<600: sw=4 ts=4 + */ diff -Nur php-5.0.4/main/hardened_php.h hardened-php-5.0.4-0.2.7/main/hardened_php.h --- php-5.0.4/main/hardened_php.h 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/hardened_php.h 2005-04-07 02:05:01.000000000 +0200 @@ -0,0 +1,45 @@ +/* + +----------------------------------------------------------------------+ + | Hardened-PHP | + +----------------------------------------------------------------------+ + | Copyright (c) 2004 Stefan Esser | + +----------------------------------------------------------------------+ + | This source file is subject to version 2.02 of the PHP license, | + | that is bundled with this package in the file LICENSE, and is | + | available at through the world-wide-web at | + | http://www.php.net/license/2_02.txt. | + | If you did not receive a copy of the PHP license and are unable to | + | obtain it through the world-wide-web, please send a note to | + | license@php.net so we can mail you a copy immediately. | + +----------------------------------------------------------------------+ + | Author: Stefan Esser | + +----------------------------------------------------------------------+ + */ + +#ifndef HARDENED_PHP_H +#define HARDENED_PHP_H + +#include "zend.h" + +#if HARDENED_PHP +PHPAPI void php_security_log(char *str); +PHPAPI void hardened_startup(); +#define HARDENED_PHP_VERSION "0.2.7" +#endif + +#if HARDENED_PHP_MM_PROTECT || HARDENED_PHP_LL_PROTECT || HARDENED_PHP_HASH_PROTECT +PHPAPI unsigned int php_canary(); +#endif + +#if HARDENED_PHP_INC_PROTECT +PHPAPI int php_is_valid_include(zval *z); +#endif + +#endif /* HARDENED_PHP_H */ + +/* + * Local variables: + * tab-width: 4 + * c-basic-offset: 4 + * End: + */ diff -Nur php-5.0.4/main/hardened_php.m4 hardened-php-5.0.4-0.2.7/main/hardened_php.m4 --- php-5.0.4/main/hardened_php.m4 1970-01-01 01:00:00.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/hardened_php.m4 2005-04-07 02:04:39.000000000 +0200 @@ -0,0 +1,95 @@ +dnl +dnl $Id: hardened_php.m4,v 1.1 2004/11/14 13:24:24 ionic Exp $ +dnl +dnl This file contains Hardened-PHP specific autoconf functions. +dnl + +AC_ARG_ENABLE(hardened-php-mm-protect, +[ --disable-hardened-php-mm-protect Disable the Memory Manager protection.],[ + DO_HARDENED_PHP_MM_PROTECT=$enableval +],[ + DO_HARDENED_PHP_MM_PROTECT=yes +]) + +AC_ARG_ENABLE(hardened-php-ll-protect, +[ --disable-hardened-php-ll-protect Disable the Linked List protection.],[ + DO_HARDENED_PHP_LL_PROTECT=$enableval +],[ + DO_HARDENED_PHP_LL_PROTECT=yes +]) + +AC_ARG_ENABLE(hardened-php-inc-protect, +[ --disable-hardened-php-inc-protect Disable include/require protection.],[ + DO_HARDENED_PHP_INC_PROTECT=$enableval +],[ + DO_HARDENED_PHP_INC_PROTECT=yes +]) + +AC_ARG_ENABLE(hardened-php-fmt-protect, +[ --disable-hardened-php-fmt-protect Disable format string protection.],[ + DO_HARDENED_PHP_FMT_PROTECT=$enableval +],[ + DO_HARDENED_PHP_FMT_PROTECT=yes +]) + +AC_ARG_ENABLE(hardened-php-hash-protect, +[ --disable-hardened-php-hash-protect Disable HashTable destructor protection.],[ + DO_HARDENED_PHP_HASH_PROTECT=$enableval +],[ + DO_HARDENED_PHP_HASH_PROTECT=yes +]) + +AC_MSG_CHECKING(whether to protect the Zend Memory Manager) +AC_MSG_RESULT($DO_HARDENED_PHP_MM_PROTECT) + +AC_MSG_CHECKING(whether to protect the Zend Linked Lists) +AC_MSG_RESULT($DO_HARDENED_PHP_LL_PROTECT) + +AC_MSG_CHECKING(whether to protect include/require statements) +AC_MSG_RESULT($DO_HARDENED_PHP_INC_PROTECT) + +AC_MSG_CHECKING(whether to protect PHP Format String functions) +AC_MSG_RESULT($DO_HARDENED_PHP_FMT_PROTECT) + +AC_MSG_CHECKING(whether to protect the destructor of Zend HashTables) +AC_MSG_RESULT($DO_HARDENED_PHP_HASH_PROTECT) + + +AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + + +if test "$DO_HARDENED_PHP_MM_PROTECT" = "yes"; then +dnl AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + AC_DEFINE(HARDENED_PHP_MM_PROTECT, 1, [Memory Manager Protection]) +else + AC_DEFINE(HARDENED_PHP_MM_PROTECT, 0, [Memory Manager Protection]) +fi + +if test "$DO_HARDENED_PHP_LL_PROTECT" = "yes"; then +dnl AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + AC_DEFINE(HARDENED_PHP_LL_PROTECT, 1, [Linked List Protection]) +else + AC_DEFINE(HARDENED_PHP_LL_PROTECT, 0, [Linked List Protection]) +fi + +if test "$DO_HARDENED_PHP_INC_PROTECT" = "yes"; then +dnl AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + AC_DEFINE(HARDENED_PHP_INC_PROTECT, 1, [Include/Require Protection]) +else + AC_DEFINE(HARDENED_PHP_INC_PROTECT, 0, [Include/Require Protection]) +fi + +if test "$DO_HARDENED_PHP_FMT_PROTECT" = "yes"; then +dnl AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + AC_DEFINE(HARDENED_PHP_FMT_PROTECT, 1, [Fmt String Protection]) +else + AC_DEFINE(HARDENED_PHP_FMT_PROTECT, 0, [Fmt String Protection]) +fi + +if test "$DO_HARDENED_PHP_HASH_PROTECT" = "yes"; then +dnl AC_DEFINE(HARDENED_PHP, 1, [Hardened-PHP]) + AC_DEFINE(HARDENED_PHP_HASH_PROTECT, 1, [HashTable DTOR Protection]) +else + AC_DEFINE(HARDENED_PHP_HASH_PROTECT, 0, [HashTable DTOR Protection]) +fi + diff -Nur php-5.0.4/main/main.c hardened-php-5.0.4-0.2.7/main/main.c --- php-5.0.4/main/main.c 2005-03-24 02:11:35.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/main.c 2005-04-07 02:04:39.000000000 +0200 @@ -92,6 +92,10 @@ #include "SAPI.h" #include "rfc1867.h" +#if HARDENED_PHP +#include "hardened_globals.h" +#endif + /* }}} */ #ifndef ZTS @@ -116,10 +120,33 @@ */ static PHP_INI_MH(OnChangeMemoryLimit) { +#if HARDENED_PHP + long orig_memory_limit; + + if (entry->modified) { + orig_memory_limit = zend_atoi(entry->orig_value, entry->orig_value_length); + } else { + orig_memory_limit = 1<<30; + } + if (orig_memory_limit < 0 || orig_memory_limit > (1<<30)) { + orig_memory_limit = 1<<30; + } +#endif if (new_value) { PG(memory_limit) = zend_atoi(new_value, new_value_length); +#if HARDENED_PHP + if (PG(memory_limit) > orig_memory_limit) { + PG(memory_limit) = orig_memory_limit; + php_security_log("script tried to increase memory_limit above allowed value"); + return FAILURE; + } +#endif } else { +#if HARDENED_PHP + PG(memory_limit) = orig_memory_limit; +#else PG(memory_limit) = 1<<30; /* effectively, no limit */ +#endif } return zend_set_memory_limit(PG(memory_limit)); } @@ -1313,6 +1340,10 @@ tsrm_ls = ts_resource(0); #endif +#if HARDENED_PHP + hardened_startup(); +#endif + module_shutdown = 0; module_startup = 1; sapi_initialize_empty_request(TSRMLS_C); @@ -1326,6 +1357,12 @@ php_output_startup(); +#if HARDENED_PHP_INC_PROTECT + zuf.is_valid_include = php_is_valid_include; +#endif +#if HARDENED_PHP + zuf.security_log_function = php_security_log; +#endif zuf.error_function = php_error_cb; zuf.printf_function = php_printf; zuf.write_function = php_body_write_wrapper; @@ -1429,6 +1466,10 @@ REGISTER_MAIN_STRINGL_CONSTANT("PHP_CONFIG_FILE_PATH", PHP_CONFIG_FILE_PATH, sizeof(PHP_CONFIG_FILE_PATH)-1, CONST_PERSISTENT | CONST_CS); REGISTER_MAIN_STRINGL_CONSTANT("PHP_CONFIG_FILE_SCAN_DIR", PHP_CONFIG_FILE_SCAN_DIR, sizeof(PHP_CONFIG_FILE_SCAN_DIR)-1, CONST_PERSISTENT | CONST_CS); REGISTER_MAIN_STRINGL_CONSTANT("PHP_SHLIB_SUFFIX", PHP_SHLIB_SUFFIX, sizeof(PHP_SHLIB_SUFFIX)-1, CONST_PERSISTENT | CONST_CS); +#if HARDENED_PHP + REGISTER_MAIN_LONG_CONSTANT("HARDENED_PHP", 1, CONST_PERSISTENT | CONST_CS); + REGISTER_MAIN_STRINGL_CONSTANT("HARDENED_PHP_VERSION", HARDENED_PHP_VERSION, sizeof(HARDENED_PHP_VERSION)-1, CONST_PERSISTENT | CONST_CS); +#endif REGISTER_MAIN_STRINGL_CONSTANT("PHP_EOL", PHP_EOL, sizeof(PHP_EOL)-1, CONST_PERSISTENT | CONST_CS); php_output_register_constants(TSRMLS_C); php_rfc1867_register_constants(TSRMLS_C); diff -Nur php-5.0.4/main/php.h hardened-php-5.0.4-0.2.7/main/php.h --- php-5.0.4/main/php.h 2005-03-14 10:41:39.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/php.h 2005-04-07 02:04:39.000000000 +0200 @@ -35,11 +35,19 @@ #include "zend_qsort.h" #include "php_compat.h" + #include "zend_API.h" #undef sprintf #define sprintf php_sprintf +#if HARDENED_PHP +#if HAVE_REALPATH +#undef realpath +#define realpath php_realpath +#endif +#endif + /* PHP's DEBUG value must match Zend's ZEND_DEBUG value */ #undef PHP_DEBUG #define PHP_DEBUG ZEND_DEBUG @@ -341,6 +349,7 @@ #define PHP_FUNCTION ZEND_FUNCTION #define PHP_METHOD ZEND_METHOD +#define PHP_STATIC_FE ZEND_STATIC_FE #define PHP_NAMED_FE ZEND_NAMED_FE #define PHP_FE ZEND_FE #define PHP_FALIAS ZEND_FALIAS @@ -446,6 +455,10 @@ #endif #endif /* !XtOffsetOf */ +#if HARDENED_PHP +#include "hardened_php.h" +#endif + #endif /* diff -Nur php-5.0.4/main/php_config.h.in hardened-php-5.0.4-0.2.7/main/php_config.h.in --- php-5.0.4/main/php_config.h.in 2005-04-03 11:42:53.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/main/php_config.h.in 2005-04-07 02:04:39.000000000 +0200 @@ -746,6 +746,39 @@ /* hardcode for each of the cross compiler host */ #undef PHP_UNAME +/* Hardened-PHP */ +#undef HARDENED_PHP + +/* Memory Manager Protection */ +#undef HARDENED_PHP_MM_PROTECT + +/* Memory Manager Protection */ +#undef HARDENED_PHP_MM_PROTECT + +/* Linked List Protection */ +#undef HARDENED_PHP_LL_PROTECT + +/* Linked List Protection */ +#undef HARDENED_PHP_LL_PROTECT + +/* Include/Require Protection */ +#undef HARDENED_PHP_INC_PROTECT + +/* Include/Require Protection */ +#undef HARDENED_PHP_INC_PROTECT + +/* Fmt String Protection */ +#undef HARDENED_PHP_FMT_PROTECT + +/* Fmt String Protection */ +#undef HARDENED_PHP_FMT_PROTECT + +/* HashTable DTOR Protection */ +#undef HARDENED_PHP_HASH_PROTECT + +/* HashTable DTOR Protection */ +#undef HARDENED_PHP_HASH_PROTECT + /* Whether you have AOLserver */ #undef HAVE_AOLSERVER @@ -1077,6 +1110,12 @@ /* Define if you have the getaddrinfo function */ #undef HAVE_GETADDRINFO +/* Whether realpath is broken */ +#undef PHP_BROKEN_REALPATH + +/* Whether realpath is broken */ +#undef PHP_BROKEN_REALPATH + /* Whether system headers declare timezone */ #undef HAVE_DECLARED_TIMEZONE diff -Nur php-5.0.4/main/snprintf.c hardened-php-5.0.4-0.2.7/main/snprintf.c --- php-5.0.4/main/snprintf.c 2004-11-16 00:14:40.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/main/snprintf.c 2005-04-07 02:04:39.000000000 +0200 @@ -1013,7 +1013,11 @@ case 'n': +#if HARDENED_PHP_FMT_PROTECT + php_security_log("'n' specifier within format string"); +#else *(va_arg(ap, int *)) = cc; +#endif break; /* diff -Nur php-5.0.4/main/spprintf.c hardened-php-5.0.4-0.2.7/main/spprintf.c --- php-5.0.4/main/spprintf.c 2004-04-16 01:04:49.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/main/spprintf.c 2005-04-07 02:04:39.000000000 +0200 @@ -630,7 +630,11 @@ case 'n': +#if HARDENED_PHP_FMT_PROTECT + php_security_log("'n' specifier within format string"); +#else *(va_arg(ap, int *)) = xbuf->len; +#endif break; /* diff -Nur php-5.0.4/php.ini-dist hardened-php-5.0.4-0.2.7/php.ini-dist --- php-5.0.4/php.ini-dist 2005-03-01 01:25:09.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/php.ini-dist 2005-04-07 02:04:39.000000000 +0200 @@ -1187,6 +1187,23 @@ ; instead of original one. soap.wsdl_cache_ttl=86400 +[varfilter] +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; +; Hardened-PHP's variable filter +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; + +; Maximum number of input variables per request +varfilter.max_request_variables = 200 + +; Maximum characters in input variable names +varfilter.max_varname_length = 64 + +; Maximum length of input variable values +varfilter.max_value_length = 10000 + +; Maximum depth of input variable arrays +varfilter.max_array_depth = 100 + ; Local Variables: ; tab-width: 4 ; End: diff -Nur php-5.0.4/php.ini-recommended hardened-php-5.0.4-0.2.7/php.ini-recommended --- php-5.0.4/php.ini-recommended 2005-03-01 01:25:09.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/php.ini-recommended 2005-04-07 02:04:39.000000000 +0200 @@ -1245,6 +1245,23 @@ ; instead of original one. soap.wsdl_cache_ttl=86400 +[varfilter] +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; +; Hardened-PHP's variable filter +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; + +; Maximum number of input variables per request +varfilter.max_request_variables = 200 + +; Maximum characters in input variable names +varfilter.max_varname_length = 64 + +; Maximum length of input variable values +varfilter.max_value_length = 10000 + +; Maximum depth of input variable arrays +varfilter.max_array_depth = 100 + ; Local Variables: ; tab-width: 4 ; End: diff -Nur php-5.0.4/sapi/apache/mod_php5.c hardened-php-5.0.4-0.2.7/sapi/apache/mod_php5.c --- php-5.0.4/sapi/apache/mod_php5.c 2004-07-14 11:43:26.000000000 +0200 +++ hardened-php-5.0.4-0.2.7/sapi/apache/mod_php5.c 2005-04-07 02:04:39.000000000 +0200 @@ -447,7 +447,7 @@ sapi_apache_get_fd, sapi_apache_force_http_10, sapi_apache_get_target_uid, - sapi_apache_get_target_gid + sapi_apache_get_target_gid, }; /* }}} */ @@ -899,7 +899,11 @@ { TSRMLS_FETCH(); if (PG(expose_php)) { +#if HARDENED_PHP + ap_add_version_component("Hardened-PHP/" PHP_VERSION); +#else ap_add_version_component("PHP/" PHP_VERSION); +#endif } } #endif diff -Nur php-5.0.4/sapi/apache2filter/sapi_apache2.c hardened-php-5.0.4-0.2.7/sapi/apache2filter/sapi_apache2.c --- php-5.0.4/sapi/apache2filter/sapi_apache2.c 2005-01-07 07:28:24.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/sapi/apache2filter/sapi_apache2.c 2005-04-07 02:04:39.000000000 +0200 @@ -572,7 +572,11 @@ { TSRMLS_FETCH(); if (PG(expose_php)) { +#if HARDENED_PHP + ap_add_version_component(p, "Hardened-PHP/" PHP_VERSION); +#else ap_add_version_component(p, "PHP/" PHP_VERSION); +#endif } } diff -Nur php-5.0.4/sapi/apache2handler/sapi_apache2.c hardened-php-5.0.4-0.2.7/sapi/apache2handler/sapi_apache2.c --- php-5.0.4/sapi/apache2handler/sapi_apache2.c 2005-03-10 12:23:57.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/sapi/apache2handler/sapi_apache2.c 2005-04-07 02:04:39.000000000 +0200 @@ -340,7 +340,11 @@ { TSRMLS_FETCH(); if (PG(expose_php)) { +#if HARDENED_PHP + ap_add_version_component(p, "Hardened-PHP/" PHP_VERSION); +#else ap_add_version_component(p, "PHP/" PHP_VERSION); +#endif } } diff -Nur php-5.0.4/sapi/cgi/cgi_main.c hardened-php-5.0.4-0.2.7/sapi/cgi/cgi_main.c --- php-5.0.4/sapi/cgi/cgi_main.c 2005-02-11 03:06:48.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/sapi/cgi/cgi_main.c 2005-04-07 02:04:39.000000000 +0200 @@ -1414,11 +1414,19 @@ SG(headers_sent) = 1; SG(request_info).no_headers = 1; } +#if HARDENED_PHP +#if ZEND_DEBUG + php_printf("Hardened-PHP %s/%s (%s) (built: %s %s) (DEBUG)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, HARDENED_PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); +#else + php_printf("Hardened-PHP %s/%s (%s) (built: %s %s)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, HARDENED_PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); +#endif +#else #if ZEND_DEBUG php_printf("PHP %s (%s) (built: %s %s) (DEBUG)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); #else php_printf("PHP %s (%s) (built: %s %s)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); #endif +#endif php_end_ob_buffers(1 TSRMLS_CC); exit(1); break; diff -Nur php-5.0.4/sapi/cli/php_cli.c hardened-php-5.0.4-0.2.7/sapi/cli/php_cli.c --- php-5.0.4/sapi/cli/php_cli.c 2005-03-22 16:09:20.000000000 +0100 +++ hardened-php-5.0.4-0.2.7/sapi/cli/php_cli.c 2005-04-07 02:04:39.000000000 +0200 @@ -694,11 +694,19 @@ if (php_request_startup(TSRMLS_C)==FAILURE) { goto err; } +#if HARDENED_PHP +#if ZEND_DEBUG + php_printf("Hardened-PHP %s/%s (%s) (built: %s %s) (DEBUG)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, HARDENED_PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); +#else + php_printf("Hardened-PHP %s/%s (%s) (built: %s %s)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, HARDENED_PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); +#endif +#else #if ZEND_DEBUG php_printf("PHP %s (%s) (built: %s %s) (DEBUG)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); #else php_printf("PHP %s (%s) (built: %s %s)\nCopyright (c) 1997-2004 The PHP Group\n%s", PHP_VERSION, sapi_module.name, __DATE__, __TIME__, get_zend_version()); #endif +#endif php_end_ob_buffers(1 TSRMLS_CC); exit_status=1; goto out;