Page MenuHomePhabricator

2022-wikiseo-semgrep-r-php-phpcs-security-audit.txt

Authored By
mmartorana
Mar 30 2022, 9:21 AM
Size
1 KB
Referenced Files
None
Subscribers
None

2022-wikiseo-semgrep-r-php-phpcs-security-audit.txt

 includes/Generator/AbstractBaseGenerator.php 
php.lang.security.weak-crypto.weak-crypto
Detected usage of weak crypto function. Consider using stronger alternatives.
Details: https://sg.run/KlBn
130┆ $cacheHash =
131┆ '?version=' . md5( $file->getTimestamp() . $file->getWidth() . $file->getHeight() );
 includes/WikiSEO.php 
php.lang.security.unserialize-use.unserialize-use
Calling `unserialize()` with user input in the pattern can lead to arbitrary code execution.
Consider using JSON or structured data approaches (e.g. Google Protocol Buffers).
Details: https://sg.run/b24E
258┆ $valueUnserialized = unserialize( $value, [ 'allowed_classes' => false ] );
⋮┆----------------------------------------
288┆ $value = unserialize( $prop, [ 'allowed_classes' => false ] );
 maintenance/GenerateDescription.php 
php.lang.security.file-inclusion.file-inclusion
Detected non-constant file inclusion. This can lead to local file inclusion (LFI) or remote
file inclusion (RFI) if user input reaches this statement. LFI and RFI could lead to
sensitive files being obtained by attackers. Instead, explicitly specify what to include. If
that is not a viable solution, validate user input thoroughly.
Details: https://sg.run/Ge56
10┆ require_once "$IP/maintenance/Maintenance.php";
⋮┆----------------------------------------
94┆ require_once RUN_MAINTENANCE_IF_MAIN;

File Metadata

Mime Type
text/plain
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
9388122
Default Alt Text
2022-wikiseo-semgrep-r-php-phpcs-security-audit.txt (1 KB)

Event Timeline