From: Peter Rabbitson Date: Tue, 21 Dec 2010 12:56:07 +0000 (+0100) Subject: injection_guard implementation X-Git-Url: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?a=commitdiff_plain;h=b6251592f2832d5353d37bd05e522091f20ff38f;p=scpubgit%2FQ-Branch.git injection_guard implementation --- diff --git a/Changes b/Changes index be48dd2..d3eceb4 100644 --- a/Changes +++ b/Changes @@ -1,5 +1,6 @@ Revision history for SQL::Abstract + - Extra checks of search arguments for possible SQL injection attacks - Remove excess parentheses in debug SQL - Fix parsing of foo.* in SQLA::Tree - Fix bindtype fail when using -between with arrayrefref literals diff --git a/lib/SQL/Abstract.pm b/lib/SQL/Abstract.pm index 4802d4c..6ed7985 100644 --- a/lib/SQL/Abstract.pm +++ b/lib/SQL/Abstract.pm @@ -93,16 +93,29 @@ sub new { # special operators $opt{special_ops} ||= []; + # regexes are applied in order, thus push after user-defines push @{$opt{special_ops}}, @BUILTIN_SPECIAL_OPS; # unary operators $opt{unary_ops} ||= []; push @{$opt{unary_ops}}, @BUILTIN_UNARY_OPS; - return bless \%opt, $class; -} + # rudimentary saniy-check for user supplied bits treated as functions/operators + # If a purported function matches this regular expression, an exception is thrown. + # Literal SQL is *NOT* subject to this check, only functions (and column names + # when quoting is not in effect) + # FIXME + # need to guard against ()'s in column names too, but this will break tons of + # hacks... ideas anyone? + $opt{injection_guard} ||= qr/ + \; + | + ^ \s* go \s + /xmi; + return bless \%opt, $class; +} #====================================================================== # INSERT methods @@ -534,6 +547,14 @@ sub _where_unary_op { $self->debug("Generic unary OP: $op - recursing as function"); + if ($op =~ $self->{injection_guard}) { + my $class = ref $self; + + puke "Possible SQL injection attempt '$op'. If this is indeed a part of the " + . "desired SQL use literal SQL ( \'...' or \[ '...' ] ) or supply your own " + . "{injection_guard} attribute to ${class}->new()" + } + my ($sql, @bind) = $self->_SWITCH_refkind ($rhs, { SCALAR => sub { puke "Illegal use of top-level '$op'" @@ -692,6 +713,15 @@ sub _where_hashpair_HASHREF { $op =~ s/^\s+|\s+$//g;# remove leading/trailing space $op =~ s/\s+/ /g; # compress whitespace + if ($op =~ $self->{injection_guard}) { + my $class = ref $self; + + puke "Possible SQL injection attempt '$op'. If this is indeed a part of the " + . "desired SQL use literal SQL ( \'...' or \[ '...' ] ) or supply your own " + . "{injection_guard} attribute to ${class}->new()" + } + + # so that -not_foo works correctly $op =~ s/^not_/NOT /i; @@ -1136,7 +1166,17 @@ sub _quote { return '' unless defined $_[1]; return ${$_[1]} if ref($_[1]) eq 'SCALAR'; - return $_[1] unless $_[0]->{quote_char}; + unless ($_[0]->{quote_char}) { + + if ($_[1] =~ $_[0]->{injection_guard}) { + my $class = ref $_[0]; + puke "Possible SQL injection attempt '$_[1]'. If this is indeed a part of the " + . "desired SQL use literal SQL ( \'...' or \[ '...' ] ) or supply your own " + . "{injection_guard} attribute to ${class}->new()"; + } + + return $_[1]; + } my $qref = ref $_[0]->{quote_char}; my ($l, $r); @@ -1760,6 +1800,20 @@ so that tables and column names can be individually quoted like this: SELECT `table`.`one_field` FROM `table` WHERE `table`.`other_field` = 1 +=item injection_guard + +A regular expression C that is applied to any C<-function> and unquoted +column name specified in a query structure. This is a safety mechanism to avoid +injection attacks when mishandling user input e.g.: + + my %condition_as_column_value_pairs = get_values_from_user(); + $sqla->select( ... , \%condition_as_column_value_pairs ); + +If the expression matches an exception is thrown. Note that literal SQL +supplied via C<\'...'> or C<\['...']> is B checked in any way. + +Defaults to checking for C<;> and the C keyword (TransactSQL) + =item array_datatypes When this option is true, arrayrefs in INSERT or UPDATE are diff --git a/t/20injection_guard.t b/t/20injection_guard.t new file mode 100644 index 0000000..ee1b825 --- /dev/null +++ b/t/20injection_guard.t @@ -0,0 +1,52 @@ +use strict; +use warnings; +use Test::More; +use Test::Exception; +use SQL::Abstract::Test import => ['is_same_sql_bind']; +use SQL::Abstract; + +my $sqla = SQL::Abstract->new; +my $sqla_q = SQL::Abstract->new(quote_char => '"'); + +throws_ok( sub { + $sqla->select( + 'foo', + [ 'bar' ], + { 'boby; tables' => 'bar' }, + ); +}, qr/Possible SQL injection attempt/, 'Injection thwarted on unquoted column' ); + +my ($sql, @bind) = $sqla_q->select( + 'foo', + [ 'bar' ], + { 'boby; tables' => 'bar' }, +); + +is_same_sql_bind ( + $sql, \@bind, + 'SELECT "bar" FROM "foo" WHERE ( "boby; tables" = ? )', + [ 'bar' ], + 'Correct sql with quotes on' +); + + +for ($sqla, $sqla_q) { + + throws_ok( sub { + $_->select( + 'foo', + [ 'bar' ], + { x => { 'bobby; tables' => 'y' } }, + ); + }, qr/Possible SQL injection attempt/, 'Injection thwarted on top level op'); + + throws_ok( sub { + $_->select( + 'foo', + [ 'bar' ], + { x => { '<' => { "-go\ndo some harm" => 'y' } } }, + ); + }, qr/Possible SQL injection attempt/, 'Injection thwarted on chained functions'); +} + +done_testing;