Author Topic: SQL injection vulnerability?  (Read 17607 times)

oslad

  • Guest
SQL injection vulnerability?
« on: July 12, 2006, 03:14:04 AM »
today, i read the get_input_value() code from:
program/include/main.inc
then found that Roundcube Mail may be a SQL injection vulnerability system!

there is a proof, go to "personal settings" >> "Folders", then input
Quote
6 or (select * from users;)
to Folder name, and press button "Create", it will get a error message.

currently, i don't know how to resolve it as i am a php+mysql newbie, but there is a useful link:
http://forum.joomla.org/index.php?topic=2993.0;wap2

oslad

  • Guest
Re: SQL injection vulnerability?
« Reply #1 on: July 12, 2006, 03:53:18 AM »
What about this class? How can we add it to Roundcube Mail?

Quote

/** @class: InputFilter (PHP4 & PHP5, with comments)
 * @project: PHP Input Filter
 * @date: 10-05-2005
 * @version: 1.2.2_php4/php5
 * @author: Daniel Morris
 * @contributors: Gianpaolo Racca, Ghislain Picard, Marco Wandschneider, Chris Tobin and Andrew Eddie.
 * @copyright: Daniel Morris
 * @email: dan@rootcube.com
 * @license: GNU General Public License (GPL)
 */
class InputFilter {
   var $tagsArray;         // default = empty array
   var $attrArray;         // default = empty array

   var $tagsMethod;      // default = 0
   var $attrMethod;      // default = 0

   var $xssAuto;      // default = 1
   var $tagBlacklist = array('applet', 'body', 'bgsound', 'base', 'basefont', 'embed', 'frame', 'frameset', 'head', 'html', 'id', 'iframe', 'ilayer', 'layer', 'link', 'meta', 'name', 'object', 'script', 'style', 'title', 'xml');
   var $attrBlacklist = array('action', 'background', 'codebase', 'dynsrc', 'lowsrc'); // also will strip ALL event handlers

   /**
    * Constructor for inputFilter class. Only first parameter is required.
    * @access constructor
    * @param Array $tagsArray - list of user-defined tags
    * @param Array $attrArray - list of user-defined attributes
    * @param int $tagsMethod - 0= allow just user-defined, 1= allow all but user-defined
    * @param int $attrMethod - 0= allow just user-defined, 1= allow all but user-defined
    * @param int $xssAuto - 0= only auto clean essentials, 1= allow clean blacklisted tags/attr
    */
   function inputFilter($tagsArray = array(), $attrArray = array(), $tagsMethod = 0, $attrMethod = 0, $xssAuto = 1) {
      // make sure user defined arrays are in lowercase
      for ($i = 0; $i < count($tagsArray); $i++) $tagsArray[$i] = strtolower($tagsArray[$i]);
      for ($i = 0; $i < count($attrArray); $i++) $attrArray[$i] = strtolower($attrArray[$i]);
      // assign to member vars
      $this->tagsArray = (array) $tagsArray;
      $this->attrArray = (array) $attrArray;
      $this->tagsMethod = $tagsMethod;
      $this->attrMethod = $attrMethod;
      $this->xssAuto = $xssAuto;
   }

   /**
    * Method to be called by another php script. Processes for XSS and specified bad code.
    * @access public
    * @param Mixed $source - input string/array-of-string to be 'cleaned'
    * @return String $source - 'cleaned' version of input parameter
    */
   function process($source) {
      // clean all elements in this array
      if (is_array($source)) {
         foreach($source as $key => $value)
            // filter element for XSS and other 'bad' code etc.
            if (is_string($value)) $source[$key] = $this->remove($this->decode($value));
         return $source;
      // clean this string
      } else if (is_string($source)) {
         // filter source for XSS and other 'bad' code etc.
         return $this->remove($this->decode($source));
      // return parameter as given
      } else return $source;
   }

   /**
    * Internal method to iteratively remove all unwanted tags and attributes
    * @access protected
    * @param String $source - input string to be 'cleaned'
    * @return String $source - 'cleaned' version of input parameter
    */
   function remove($source) {
      $loopCounter=0;
      // provides nested-tag protection
      while($source != $this->filterTags($source)) {
         $source = $this->filterTags($source);
         $loopCounter++;
      }
      return $source;
   }

   /**
    * Internal method to strip a string of certain tags
    * @access protected
    * @param String $source - input string to be 'cleaned'
    * @return String $source - 'cleaned' version of input parameter
    */
   function filterTags($source) {
      // filter pass setup
      $preTag = NULL;
      $postTag = $source;
      // find initial tag's position
      $tagOpen_start = strpos($source, '<');
      // interate through string until no tags left
      while($tagOpen_start !== FALSE) {
         // process tag interatively
         $preTag .= substr($postTag, 0, $tagOpen_start);
         $postTag = substr($postTag, $tagOpen_start);
         $fromTagOpen = substr($postTag, 1);
         // end of tag
         $tagOpen_end = strpos($fromTagOpen, '>');
         if ($tagOpen_end === false) break;
         // next start of tag (for nested tag assessment)
         $tagOpen_nested = strpos($fromTagOpen, '<');
         if (($tagOpen_nested !== false) && ($tagOpen_nested < $tagOpen_end)) {
            $preTag .= substr($postTag, 0, ($tagOpen_nested+1));
            $postTag = substr($postTag, ($tagOpen_nested+1));
            $tagOpen_start = strpos($postTag, '<');
            continue;
         }
         $tagOpen_nested = (strpos($fromTagOpen, '<') + $tagOpen_start + 1);
         $currentTag = substr($fromTagOpen, 0, $tagOpen_end);
         $tagLength = strlen($currentTag);
         if (!$tagOpen_end) {
            $preTag .= $postTag;
            $tagOpen_start = strpos($postTag, '<');
         }
         // iterate through tag finding attribute pairs - setup
         $tagLeft = $currentTag;
         $attrSet = array();
         $currentSpace = strpos($tagLeft, ' ');
         // is end tag
         if (substr($currentTag, 0, 1) == "/") {
            $isCloseTag = TRUE;
            list($tagName) = explode(' ', $currentTag);
            $tagName = substr($tagName, 1);
         // is start tag
         } else {
            $isCloseTag = FALSE;
            list($tagName) = explode(' ', $currentTag);
         }
         // excludes all "non-regular" tagnames OR no tagname OR remove if xssauto is on and tag is blacklisted
         if ((!preg_match("/^[a-z][a-z0-9]*$/i",$tagName)) || (!$tagName) || ((in_array(strtolower($tagName), $this->tagBlacklist)) && ($this->xssAuto))) {
            $postTag = substr($postTag, ($tagLength + 2));
            $tagOpen_start = strpos($postTag, '<');
            // don't append this tag
            continue;
         }
         // this while is needed to support attribute values with spaces in!
         while ($currentSpace !== FALSE) {
            $fromSpace = substr($tagLeft, ($currentSpace+1));
            $nextSpace = strpos($fromSpace, ' ');
            $openQuotes = strpos($fromSpace, '"');
            $closeQuotes = strpos(substr($fromSpace, ($openQuotes+1)), '"') + $openQuotes + 1;
            // another equals exists
            if (strpos($fromSpace, '=') !== FALSE) {
               // opening and closing quotes exists
               if (($openQuotes !== FALSE) && (strpos(substr($fromSpace, ($openQuotes+1)), '"') !== FALSE))
                  $attr = substr($fromSpace, 0, ($closeQuotes+1));
               // one or neither exist
               else $attr = substr($fromSpace, 0, $nextSpace);
            // no more equals exist
            } else $attr = substr($fromSpace, 0, $nextSpace);
            // last attr pair
            if (!$attr) $attr = $fromSpace;
            // add to attribute pairs array
            $attrSet[] = $attr;
            // next inc
            $tagLeft = substr($fromSpace, strlen($attr));
            $currentSpace = strpos($tagLeft, ' ');
         }
         // appears in array specified by user
         $tagFound = in_array(strtolower($tagName), $this->tagsArray);
         // remove this tag on condition
         if ((!$tagFound && $this->tagsMethod) || ($tagFound && !$this->tagsMethod)) {
            // reconstruct tag with allowed attributes
            if (!$isCloseTag) {
               $attrSet = $this->filterAttr($attrSet);
               $preTag .= '<' . $tagName;
               for ($i = 0; $i < count($attrSet); $i++)
                  $preTag .= ' ' . $attrSet[$i];
               // reformat single tags to XHTML
               if (strpos($fromTagOpen, "';
               else $preTag .= ' />';
            // just the tagname
           } else $preTag .= '';
         }
         // find next tag's start
         $postTag = substr($postTag, ($tagLength + 2));
         $tagOpen_start = strpos($postTag, '<');
      }
      // append any code after end of tags
      $preTag .= $postTag;
      return $preTag;
   }

   /**
    * Internal method to strip a tag of certain attributes
    * @access protected
    * @param Array $attrSet
    * @return Array $newSet
    */
   function filterAttr($attrSet) {
      $newSet = array();
      // process attributes
      for ($i = 0; $i          // skip blank spaces in tag
         if (!$attrSet[$i]) continue;
         // split into attr name and value
         $attrSubSet = explode('=', trim($attrSet[$i]),2);
         list($attrSubSet[0]) = explode(' ', $attrSubSet[0]);
         // removes all "non-regular" attr names AND also attr blacklisted
         if ((!eregi("^[a-z]*$",$attrSubSet[0])) || (($this->xssAuto) && ((in_array(strtolower($attrSubSet[0]), $this->attrBlacklist)) || (substr($attrSubSet[0], 0, 2) == 'on'))))
            continue;
         // xss attr value filtering
         if ($attrSubSet[1]) {
            // strips unicode, hex, etc
            $attrSubSet[1] = str_replace('&#', '', $attrSubSet[1]);
            // strip normal newline within attr value
            $attrSubSet[1] = preg_replace('/\s+/', '', $attrSubSet[1]);
            // strip double quotes
            $attrSubSet[1] = str_replace('"', '', $attrSubSet[1]);
            // [requested feature] convert single quotes from either side to doubles (Single quotes shouldn't be used to pad attr value)
            if ((substr($attrSubSet[1], 0, 1) == "'") && (substr($attrSubSet[1], (strlen($attrSubSet[1]) - 1), 1) == "'"))
               $attrSubSet[1] = substr($attrSubSet[1], 1, (strlen($attrSubSet[1]) - 2));
            // strip slashes
            $attrSubSet[1] = stripslashes($attrSubSet[1]);
         }
         // auto strip attr's with "javascript:
         if (InputFilter::badAttributeValue( $attrSubSet ))
            continue;

         // if matches user defined array
         $attrFound = in_array(strtolower($attrSubSet[0]), $this->attrArray);
         // keep this attr on condition
         if ((!$attrFound && $this->attrMethod) || ($attrFound && !$this->attrMethod)) {
            // attr has value
            if ($attrSubSet[1]) $newSet[] = $attrSubSet[0] . '="' . $attrSubSet[1] . '"';
            // attr has decimal zero as value
            else if ($attrSubSet[1] == "0") $newSet[] = $attrSubSet[0] . '="0"';
            // reformat single attributes to XHTML
            else $newSet[] = $attrSubSet[0] . '="' . $attrSubSet[0] . '"';
         }
      }
      return $newSet;
   }

   /**
    * Function to determine if contents of an attribute is safe
    * @param Array A 2 element array for attribute [name] and [value]
    * @return Boolean True if bad code is detected
    */
   function badAttributeValue( $attrSubSet ) {
      $attrSubSet[0] = strtolower( $attrSubSet[0] );
      $attrSubSet[1] = strtolower( $attrSubSet[1] );
      return (
         ((strpos($attrSubSet[1], 'expression') !== false) && ($attrSubSet[0]) == 'style') ||
         (strpos($attrSubSet[1], 'javascript:') !== false) ||
         (strpos($attrSubSet[1], 'behaviour:') !== false) ||
         (strpos($attrSubSet[1], 'vbscript:') !== false) ||
         (strpos($attrSubSet[1], 'mocha:') !== false) ||
         (strpos($attrSubSet[1], 'livescript:') !== false)
      );
   }

   /**
    * Try to convert to plaintext
    * @access protected
    * @param String $source
    * @return String $source
    */
   function decode($source) {
      // url decode
      $source = html_entity_decode($source, ENT_QUOTES, "ISO-8859-1");
      // convert decimal
      $source = preg_replace('/&#(\d+);/me',"chr(\\1)", $source);            // decimal notation
      // convert hex
      $source = preg_replace('/&#x([a-f0-9]+);/mei',"chr(0x\\1)", $source);   // hex notation
      return $source;
   }

   /**
    * Method to be called by another php script. Processes for SQL injection
    * @access public
    * @param Mixed $source - input string/array-of-string to be 'cleaned'
    * @param Buffer $connection - An open MySQL connection
    * @return String $source - 'cleaned' version of input parameter
    */
   function safeSQL($source, &$connection) {
      // clean all elements in this array
      if (is_array($source)) {
         foreach($source as $key => $value)
            // filter element for SQL injection
            if (is_string($value)) $source[$key] = $this->quoteSmart($this->decode($value), $connection);
         return $source;
      // clean this string
      } else if (is_string($source)) {
         // filter source for SQL injection
         if (is_string($source)) return $this->quoteSmart($this->decode($source), $connection);
      // return parameter as given
      } else return $source;
   }

   /**
    * @author Chris Tobin
    * @author Daniel Morris
    * @access protected
    * @param String $source
    * @param Resource $connection - An open MySQL connection
    * @return String $source
    */
   function quoteSmart($source, &$connection) {
      // strip slashes
      if (get_magic_quotes_gpc()) $source = stripslashes($source);
      // quote both numeric and text
      $source = $this->escapeString($source, $connection);
      return $source;
   }

   /**
    * @author Chris Tobin
    * @author Daniel Morris
    * @access protected
    * @param String $source
    * @param Resource $connection - An open MySQL connection
    * @return String $source
    */
   function escapeString($string, &$connection) {
      // depreciated function
      if (version_compare(phpversion(),"4.3.0", "<")) mysql_escape_string($string);
      // current function
      else mysql_real_escape_string($string);
      return $string;
   }
}

?>


Offline bpat1434

  • Administrator
  • Hero Member
  • *****
  • Posts: 673
Re: SQL injection vulnerability?
« Reply #2 on: July 12, 2006, 09:13:31 AM »
One way would be with type casting.... or with sprintf() so that what goes into the SQL string is striclty what you want.... or escaping all input (which should be done anyway).
 
  

oslad

  • Guest
Re: SQL injection vulnerability?
« Reply #3 on: July 12, 2006, 09:33:41 PM »
The Mambo CMS is scaping all input(using above code). Is RC Mail considering to use this method?

Offline bpat1434

  • Administrator
  • Hero Member
  • *****
  • Posts: 673
Re: SQL injection vulnerability?
« Reply #4 on: July 13, 2006, 10:13:09 PM »
Um... rev274 gives me a folder with the name: "6 or (select * from users;)"

Are you using the latest revision or not?
 
  

Offline Jester

  • Jr. Member
  • **
  • Posts: 20
Re: SQL injection vulnerability?
« Reply #5 on: July 13, 2006, 11:28:10 PM »
I second that (using SVN 274)

oslad

  • Guest
Re: SQL injection vulnerability?
« Reply #6 on: July 14, 2006, 08:27:29 AM »
sorry, i don't know where to get SVN, still using cvs-20060413

Offline bpat1434

  • Administrator
  • Hero Member
  • *****
  • Posts: 673
Re: SQL injection vulnerability?
« Reply #7 on: July 14, 2006, 09:45:34 AM »
https://svn.roundcube.net

You can browse the trunk there.... otherwise get an SVN client (TortoiseSVN for windows) and grab the trunk build ;)
 
  

Offline yllar

  • Full Member
  • ***
  • Posts: 106
Re: SQL injection vulnerability?
« Reply #8 on: July 14, 2006, 09:48:05 AM »
irc://irc.freenode.net:6667/#roundcube

Offline bpat1434

  • Administrator
  • Hero Member
  • *****
  • Posts: 673
Re: SQL injection vulnerability?
« Reply #9 on: July 14, 2006, 09:54:28 PM »
my above link will work..... whether you're in windows or not.... it's the program you use (TortoiseSVN for Windows, SVN support built into *nix) that is platform dependant....
 
  

oslad

  • Guest
Re: SQL injection vulnerability?
« Reply #10 on: July 14, 2006, 11:20:49 PM »
Thanks!

[root@oslad rcmail]# svn checkout https://svn.roundcube.net/trunk
-bash: svn: command not found
 :-\
[root@oslad rcmail]# yum install subversion
......
......
Installed: subversion.x86_64 0:1.2.1-0.1.2.el4.rf
Dependency Installed: neon.x86_64 0:0.24.7-4
Complete!
[root@oslad rcmail]# svn checkout https://svn.roundcube.net/trunk
......
......
A  trunk/roundcubemail
A  trunk/roundcubemail/SQL
A  trunk/roundcubemail/SQL/mysql.update.sql
......
......
A  trunk/roundcubemail/skins/default/templates/messagepart.html
A  trunk/roundcubemail/.htaccess
A  trunk/roundcubemail/README
A  trunk/roundcubemail/index.php
取出修订版 274。
 ;D

Offline Jester

  • Jr. Member
  • **
  • Posts: 20
Re: SQL injection vulnerability?
« Reply #11 on: July 15, 2006, 09:02:17 PM »
Or you can always check the unofficial snapshots thread:
http://roundcubeforum.net/index.php?topic=23.0