1 |
|
2 |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0057 |
3 |
|
4 |
http://git.php.net/?p=php-src.git;a=commitdiff;h=b2287a42a0dfd8fe392051d8f25531051cd86322 |
5 |
http://git.php.net/?p=php-src.git;a=commitdiff;h=192511f75d915c723384da17b6ca265971727132 |
6 |
http://git.php.net/?p=php-src.git;a=commitdiff;h=c9b5d92821db7335632f8578871e2b75ac018f2a |
7 |
http://git.php.net/?p=php-src.git;a=commitdiff;h=777a29fce22a741fedb69c83c3e7c2129372ee0e |
8 |
|
9 |
--- php-5.3.3/ext/xsl/php_xsl.c.cve0057 |
10 |
+++ php-5.3.3/ext/xsl/php_xsl.c |
11 |
@@ -141,6 +141,13 @@ zend_object_value xsl_objects_new(zend_c |
12 |
} |
13 |
/* }}} */ |
14 |
|
15 |
+PHP_INI_BEGIN() |
16 |
+/* Default is not allowing any write operations. |
17 |
+ XSL_SECPREF_CREATE_DIRECTORY | XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_WRITE_FILE == 44 |
18 |
+*/ |
19 |
+PHP_INI_ENTRY("xsl.security_prefs", "44", PHP_INI_ALL, NULL) |
20 |
+PHP_INI_END() |
21 |
+ |
22 |
/* {{{ PHP_MINIT_FUNCTION |
23 |
*/ |
24 |
PHP_MINIT_FUNCTION(xsl) |
25 |
@@ -167,6 +174,14 @@ PHP_MINIT_FUNCTION(xsl) |
26 |
REGISTER_LONG_CONSTANT("XSL_CLONE_NEVER", -1, CONST_CS | CONST_PERSISTENT); |
27 |
REGISTER_LONG_CONSTANT("XSL_CLONE_ALWAYS", 1, CONST_CS | CONST_PERSISTENT); |
28 |
|
29 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_NONE", XSL_SECPREF_NONE, CONST_CS | CONST_PERSISTENT); |
30 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_READ_FILE", XSL_SECPREF_READ_FILE, CONST_CS | CONST_PERSISTENT); |
31 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_WRITE_FILE", XSL_SECPREF_WRITE_FILE, CONST_CS | CONST_PERSISTENT); |
32 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_CREATE_DIRECTORY", XSL_SECPREF_CREATE_DIRECTORY, CONST_CS | CONST_PERSISTENT); |
33 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_READ_NETWORK", XSL_SECPREF_READ_NETWORK, CONST_CS | CONST_PERSISTENT); |
34 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_WRITE_NETWORK", XSL_SECPREF_WRITE_NETWORK, CONST_CS | CONST_PERSISTENT); |
35 |
+ REGISTER_LONG_CONSTANT("XSL_SECPREF_DEFAULT", XSL_SECPREF_DEFAULT, CONST_CS | CONST_PERSISTENT); |
36 |
+ |
37 |
REGISTER_LONG_CONSTANT("LIBXSLT_VERSION", LIBXSLT_VERSION, CONST_CS | CONST_PERSISTENT); |
38 |
REGISTER_STRING_CONSTANT("LIBXSLT_DOTTED_VERSION", LIBXSLT_DOTTED_VERSION, CONST_CS | CONST_PERSISTENT); |
39 |
|
40 |
@@ -175,6 +190,8 @@ PHP_MINIT_FUNCTION(xsl) |
41 |
REGISTER_STRING_CONSTANT("LIBEXSLT_DOTTED_VERSION", LIBEXSLT_DOTTED_VERSION, CONST_CS | CONST_PERSISTENT); |
42 |
#endif |
43 |
|
44 |
+ REGISTER_INI_ENTRIES(); |
45 |
+ |
46 |
return SUCCESS; |
47 |
} |
48 |
/* }}} */ |
49 |
@@ -258,6 +275,8 @@ PHP_MSHUTDOWN_FUNCTION(xsl) |
50 |
|
51 |
xsltCleanupGlobals(); |
52 |
|
53 |
+ UNREGISTER_INI_ENTRIES(); |
54 |
+ |
55 |
return SUCCESS; |
56 |
} |
57 |
/* }}} */ |
58 |
--- php-5.3.3/ext/xsl/php_xsl.h.cve0057 |
59 |
+++ php-5.3.3/ext/xsl/php_xsl.h |
60 |
@@ -32,6 +32,7 @@ extern zend_module_entry xsl_module_entr |
61 |
#include <libxslt/xsltInternals.h> |
62 |
#include <libxslt/xsltutils.h> |
63 |
#include <libxslt/transform.h> |
64 |
+#include <libxslt/security.h> |
65 |
#if HAVE_XSL_EXSLT |
66 |
#include <libexslt/exslt.h> |
67 |
#include <libexslt/exsltconfig.h> |
68 |
@@ -43,6 +44,15 @@ extern zend_module_entry xsl_module_entr |
69 |
#include <libxslt/extensions.h> |
70 |
#include <libxml/xpathInternals.h> |
71 |
|
72 |
+#define XSL_SECPREF_NONE 0 |
73 |
+#define XSL_SECPREF_READ_FILE 2 |
74 |
+#define XSL_SECPREF_WRITE_FILE 4 |
75 |
+#define XSL_SECPREF_CREATE_DIRECTORY 8 |
76 |
+#define XSL_SECPREF_READ_NETWORK 16 |
77 |
+#define XSL_SECPREF_WRITE_NETWORK 32 |
78 |
+/* Default == disable all write access == XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_CREATE_DIRECTORY | XSL_SECPREF_WRITE_FILE */ |
79 |
+#define XSL_SECPREF_DEFAULT 44 |
80 |
+ |
81 |
typedef struct _xsl_object { |
82 |
zend_object std; |
83 |
void *ptr; |
84 |
--- php-5.3.3/ext/xsl/tests/bug54446.phpt.cve0057 |
85 |
+++ php-5.3.3/ext/xsl/tests/bug54446.phpt |
86 |
@@ -0,0 +1,95 @@ |
87 |
+--TEST-- |
88 |
+Bug #54446 (Arbitrary file creation via libxslt 'output' extension) |
89 |
+--SKIPIF-- |
90 |
+<?php |
91 |
+if (!extension_loaded('xsl')) die("skip Extension XSL is required\n"); |
92 |
+?> |
93 |
+--FILE-- |
94 |
+<?php |
95 |
+include("prepare.inc"); |
96 |
+ |
97 |
+$outputfile = dirname(__FILE__)."/bug54446test.txt"; |
98 |
+if (file_exists($outputfile)) { |
99 |
+ unlink($outputfile); |
100 |
+} |
101 |
+ |
102 |
+$sXsl = <<<EOT |
103 |
+<xsl:stylesheet version="1.0" |
104 |
+ xmlns:xsl="http://www.w3.org/1999/XSL/Transform" |
105 |
+ xmlns:sax="http://icl.com/saxon" |
106 |
+ extension-element-prefixes="sax"> |
107 |
+ |
108 |
+ <xsl:template match="/"> |
109 |
+ <sax:output href="$outputfile" method="text"> |
110 |
+ <xsl:value-of select="'0wn3d via PHP and libxslt ...'"/> |
111 |
+ </sax:output> |
112 |
+ </xsl:template> |
113 |
+ |
114 |
+</xsl:stylesheet> |
115 |
+EOT; |
116 |
+ |
117 |
+$xsl->loadXML( $sXsl ); |
118 |
+ |
119 |
+# START XSLT |
120 |
+$proc->importStylesheet( $xsl ); |
121 |
+ |
122 |
+# TRASNFORM & PRINT |
123 |
+print $proc->transformToXML( $dom ); |
124 |
+ |
125 |
+ |
126 |
+if (file_exists($outputfile)) { |
127 |
+ print "$outputfile exists, but shouldn't!\n"; |
128 |
+} else { |
129 |
+ print "OK, no file created\n"; |
130 |
+} |
131 |
+ |
132 |
+#SET NO SECURITY PREFS |
133 |
+ini_set("xsl.security_prefs", XSL_SECPREF_NONE); |
134 |
+ |
135 |
+# TRASNFORM & PRINT |
136 |
+print $proc->transformToXML( $dom ); |
137 |
+ |
138 |
+ |
139 |
+if (file_exists($outputfile)) { |
140 |
+ print "OK, file exists\n"; |
141 |
+} else { |
142 |
+ print "$outputfile doesn't exist, but should!\n"; |
143 |
+} |
144 |
+ |
145 |
+unlink($outputfile); |
146 |
+ |
147 |
+#SET SECURITY PREFS AGAIN |
148 |
+ini_set("xsl.security_prefs", XSL_SECPREF_WRITE_FILE | XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_CREATE_DIRECTORY); |
149 |
+ |
150 |
+# TRASNFORM & PRINT |
151 |
+print $proc->transformToXML( $dom ); |
152 |
+ |
153 |
+if (file_exists($outputfile)) { |
154 |
+ print "$outputfile exists, but shouldn't!\n"; |
155 |
+} else { |
156 |
+ print "OK, no file created\n"; |
157 |
+} |
158 |
+ |
159 |
+ |
160 |
+--EXPECTF-- |
161 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %s element output in %s on line %d |
162 |
+ |
163 |
+Warning: XSLTProcessor::transformToXml(): File write for %s/bug54446test.txt refused in %s on line %s |
164 |
+ |
165 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %d element output in %s on line %d |
166 |
+ |
167 |
+Warning: XSLTProcessor::transformToXml(): xsltDocumentElem: write rights for %s/bug54446test.txt denied in %s on line %d |
168 |
+OK, no file created |
169 |
+OK, file exists |
170 |
+ |
171 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %s element output in %s on line %d |
172 |
+ |
173 |
+Warning: XSLTProcessor::transformToXml(): File write for %s/bug54446test.txt refused in %s on line %s |
174 |
+ |
175 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %d element output in %s on line %d |
176 |
+ |
177 |
+Warning: XSLTProcessor::transformToXml(): xsltDocumentElem: write rights for %s/bug54446test.txt denied in %s on line %d |
178 |
+OK, no file created |
179 |
+--CREDITS-- |
180 |
+Christian Stocker, chregu@php.net |
181 |
+ |
182 |
--- php-5.3.3/ext/xsl/tests/bug54446_with_ini.phpt.cve0057 |
183 |
+++ php-5.3.3/ext/xsl/tests/bug54446_with_ini.phpt |
184 |
@@ -0,0 +1,95 @@ |
185 |
+--TEST-- |
186 |
+Bug #54446 (Arbitrary file creation via libxslt 'output' extension with php.ini setting) |
187 |
+--SKIPIF-- |
188 |
+<?php |
189 |
+if (!extension_loaded('xsl')) die("skip Extension XSL is required\n"); |
190 |
+?> |
191 |
+--FILE-- |
192 |
+<?php |
193 |
+include("prepare.inc"); |
194 |
+ |
195 |
+$outputfile = dirname(__FILE__)."/bug54446test.txt"; |
196 |
+if (file_exists($outputfile)) { |
197 |
+ unlink($outputfile); |
198 |
+} |
199 |
+ |
200 |
+$sXsl = <<<EOT |
201 |
+<xsl:stylesheet version="1.0" |
202 |
+ xmlns:xsl="http://www.w3.org/1999/XSL/Transform" |
203 |
+ xmlns:sax="http://icl.com/saxon" |
204 |
+ extension-element-prefixes="sax"> |
205 |
+ |
206 |
+ <xsl:template match="/"> |
207 |
+ <sax:output href="$outputfile" method="text"> |
208 |
+ <xsl:value-of select="'0wn3d via PHP and libxslt ...'"/> |
209 |
+ </sax:output> |
210 |
+ </xsl:template> |
211 |
+ |
212 |
+</xsl:stylesheet> |
213 |
+EOT; |
214 |
+ |
215 |
+$xsl->loadXML( $sXsl ); |
216 |
+ |
217 |
+# START XSLT |
218 |
+$proc->importStylesheet( $xsl ); |
219 |
+ |
220 |
+# TRASNFORM & PRINT |
221 |
+print $proc->transformToXML( $dom ); |
222 |
+ |
223 |
+ |
224 |
+if (file_exists($outputfile)) { |
225 |
+ print "$outputfile exists, but shouldn't!\n"; |
226 |
+} else { |
227 |
+ print "OK, no file created\n"; |
228 |
+} |
229 |
+ |
230 |
+#SET NO SECURITY PREFS |
231 |
+ini_set("xsl.security_prefs", XSL_SECPREF_NONE); |
232 |
+ |
233 |
+# TRASNFORM & PRINT |
234 |
+print $proc->transformToXML( $dom ); |
235 |
+ |
236 |
+ |
237 |
+if (file_exists($outputfile)) { |
238 |
+ print "OK, file exists\n"; |
239 |
+} else { |
240 |
+ print "$outputfile doesn't exist, but should!\n"; |
241 |
+} |
242 |
+ |
243 |
+unlink($outputfile); |
244 |
+ |
245 |
+#SET SECURITY PREFS AGAIN |
246 |
+ini_set("xsl.security_prefs", XSL_SECPREF_WRITE_FILE | XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_CREATE_DIRECTORY); |
247 |
+ |
248 |
+# TRASNFORM & PRINT |
249 |
+print $proc->transformToXML( $dom ); |
250 |
+ |
251 |
+if (file_exists($outputfile)) { |
252 |
+ print "$outputfile exists, but shouldn't!\n"; |
253 |
+} else { |
254 |
+ print "OK, no file created\n"; |
255 |
+} |
256 |
+ |
257 |
+ |
258 |
+--EXPECTF-- |
259 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %s element output in %s on line %d |
260 |
+ |
261 |
+Warning: XSLTProcessor::transformToXml(): File write for %s/bug54446test.txt refused in %s on line %s |
262 |
+ |
263 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %d element output in %s on line %d |
264 |
+ |
265 |
+Warning: XSLTProcessor::transformToXml(): xsltDocumentElem: write rights for %s/bug54446test.txt denied in %s on line %d |
266 |
+OK, no file created |
267 |
+OK, file exists |
268 |
+ |
269 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %s element output in %s on line %d |
270 |
+ |
271 |
+Warning: XSLTProcessor::transformToXml(): File write for %s/bug54446test.txt refused in %s on line %s |
272 |
+ |
273 |
+Warning: XSLTProcessor::transformToXml(): runtime error: file %s line %d element output in %s on line %d |
274 |
+ |
275 |
+Warning: XSLTProcessor::transformToXml(): xsltDocumentElem: write rights for %s/bug54446test.txt denied in %s on line %d |
276 |
+OK, no file created |
277 |
+--CREDITS-- |
278 |
+Christian Stocker, chregu@php.net |
279 |
+ |
280 |
--- php-5.3.3/ext/xsl/xsltprocessor.c.cve0057 |
281 |
+++ php-5.3.3/ext/xsl/xsltprocessor.c |
282 |
@@ -475,6 +475,9 @@ static xmlDocPtr php_xsl_apply_styleshee |
283 |
zval *doXInclude, *member; |
284 |
zend_object_handlers *std_hnd; |
285 |
FILE *f; |
286 |
+ int secPrefsError = 0; |
287 |
+ int secPrefsValue; |
288 |
+ xsltSecurityPrefsPtr secPrefs = NULL; |
289 |
|
290 |
node = php_libxml_import_node(docp TSRMLS_CC); |
291 |
|
292 |
@@ -531,11 +534,56 @@ static xmlDocPtr php_xsl_apply_styleshee |
293 |
} |
294 |
efree(member); |
295 |
|
296 |
- newdocp = xsltApplyStylesheetUser(style, doc, (const char**) params, NULL, f, ctxt); |
297 |
+ |
298 |
+ secPrefsValue = INI_INT("xsl.security_prefs"); |
299 |
+ |
300 |
+ /* if securityPrefs is set to NONE, we don't have to do any checks, but otherwise... */ |
301 |
+ if (secPrefsValue != XSL_SECPREF_NONE) { |
302 |
+ secPrefs = xsltNewSecurityPrefs(); |
303 |
+ if (secPrefsValue & XSL_SECPREF_READ_FILE ) { |
304 |
+ if (0 != xsltSetSecurityPrefs(secPrefs, XSLT_SECPREF_READ_FILE, xsltSecurityForbid)) { |
305 |
+ secPrefsError = 1; |
306 |
+ } |
307 |
+ } |
308 |
+ if (secPrefsValue & XSL_SECPREF_WRITE_FILE ) { |
309 |
+ if (0 != xsltSetSecurityPrefs(secPrefs, XSLT_SECPREF_WRITE_FILE, xsltSecurityForbid)) { |
310 |
+ secPrefsError = 1; |
311 |
+ } |
312 |
+ } |
313 |
+ if (secPrefsValue & XSL_SECPREF_CREATE_DIRECTORY ) { |
314 |
+ if (0 != xsltSetSecurityPrefs(secPrefs, XSLT_SECPREF_CREATE_DIRECTORY, xsltSecurityForbid)) { |
315 |
+ secPrefsError = 1; |
316 |
+ } |
317 |
+ } |
318 |
+ if (secPrefsValue & XSL_SECPREF_READ_NETWORK) { |
319 |
+ if (0 != xsltSetSecurityPrefs(secPrefs, XSLT_SECPREF_READ_NETWORK, xsltSecurityForbid)) { |
320 |
+ secPrefsError = 1; |
321 |
+ } |
322 |
+ } |
323 |
+ if (secPrefsValue & XSL_SECPREF_WRITE_NETWORK) { |
324 |
+ if (0 != xsltSetSecurityPrefs(secPrefs, XSLT_SECPREF_WRITE_NETWORK, xsltSecurityForbid)) { |
325 |
+ secPrefsError = 1; |
326 |
+ } |
327 |
+ } |
328 |
+ |
329 |
+ if (0 != xsltSetCtxtSecurityPrefs(secPrefs, ctxt)) { |
330 |
+ secPrefsError = 1; |
331 |
+ } |
332 |
+ } |
333 |
+ |
334 |
+ if (secPrefsError == 1) { |
335 |
+ php_error_docref(NULL TSRMLS_CC, E_WARNING, "Can't set libxslt security properties, not doing transformation for security reasons"); |
336 |
+ } else { |
337 |
+ newdocp = xsltApplyStylesheetUser(style, doc, (const char**) params, NULL, f, ctxt); |
338 |
+ } |
339 |
if (f) { |
340 |
fclose(f); |
341 |
} |
342 |
+ |
343 |
xsltFreeTransformContext(ctxt); |
344 |
+ if (secPrefs) { |
345 |
+ xsltFreeSecurityPrefs(secPrefs); |
346 |
+ } |
347 |
|
348 |
if (intern->node_list != NULL) { |
349 |
zend_hash_destroy(intern->node_list); |
350 |
--- php-5.3.3/php.ini-development.cve0057 |
351 |
+++ php-5.3.3/php.ini-development |
352 |
@@ -1890,6 +1890,12 @@ ldap.max_links = -1 |
353 |
[dba] |
354 |
;dba.default_handler= |
355 |
|
356 |
+[xsl] |
357 |
+; Write operations from within XSLT are disabled by default. |
358 |
+; XSL_SECPREF_CREATE_DIRECTORY | XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_WRITE_FILE = 44 |
359 |
+; Set it to 0 to allow all operations |
360 |
+;xsl.security_prefs = 44 |
361 |
+ |
362 |
; Local Variables: |
363 |
; tab-width: 4 |
364 |
; End: |
365 |
--- php-5.3.3/php.ini-production.cve0057 |
366 |
+++ php-5.3.3/php.ini-production |
367 |
@@ -1897,6 +1897,12 @@ ldap.max_links = -1 |
368 |
[dba] |
369 |
;dba.default_handler= |
370 |
|
371 |
+[xsl] |
372 |
+; Write operations from within XSLT are disabled by default. |
373 |
+; XSL_SECPREF_CREATE_DIRECTORY | XSL_SECPREF_WRITE_NETWORK | XSL_SECPREF_WRITE_FILE = 44 |
374 |
+; Set it to 0 to allow all operations |
375 |
+;xsl.security_prefs = 44 |
376 |
+ |
377 |
; Local Variables: |
378 |
; tab-width: 4 |
379 |
; End: |
380 |
--- php-5.3.3/UPGRADING.cve0057 |
381 |
+++ php-5.3.3/UPGRADING |
382 |
@@ -150,6 +150,15 @@ UPGRADE NOTES - PHP 5.3 |
383 |
|
384 |
- SplObjectStorage now has ArrayAccess support. It is also now possible to |
385 |
store associative information with objects in SplObjectStorage. |
386 |
+ |
387 |
+===================== |
388 |
+4.1 New in PHP 5.3.9 |
389 |
+===================== |
390 |
+ |
391 |
+- Write operations within XSLT (for example with the extension sax:output) are |
392 |
+ disabled by default. You can define what is forbidden with the INI option |
393 |
+ xsl.security_prefs. This option will be marked as deprecated in 5.4 again. |
394 |
+ Use the method XsltProcess::setSecurityPrefs($options) there. |
395 |
|
396 |
============= |
397 |
5. Deprecated |