Server IP : 85.214.239.14 / Your IP : 18.190.239.189 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/task/2/cwd/var/www/wordpress/phpMyAdmin/libraries/classes/ |
Upload File : |
<?php /* vim: set expandtab sw=4 ts=4 sts=4: */ /** * Get user's global privileges and some db-specific privileges * * @package PhpMyAdmin */ declare(strict_types=1); namespace PhpMyAdmin; use PhpMyAdmin\DatabaseInterface; use PhpMyAdmin\Util; /** * PhpMyAdmin\CheckUserPrivileges class * * @package PhpMyAdmin */ class CheckUserPrivileges { /** * @var DatabaseInterface */ private $dbi; /** * Constructor * * @param DatabaseInterface $dbi DatabaseInterface object */ public function __construct(DatabaseInterface $dbi) { $this->dbi = $dbi; } /** * Extracts details from a result row of a SHOW GRANT query * * @param string $row grant row * * @return array */ public function getItemsFromShowGrantsRow(string $row): array { $db_name_offset = mb_strpos($row, ' ON ') + 4; $tblname_end_offset = mb_strpos($row, ' TO '); $tblname_start_offset = false; if (($__tblname_start_offset = mb_strpos($row, '`.', $db_name_offset)) && $__tblname_start_offset < $tblname_end_offset) { $tblname_start_offset = $__tblname_start_offset + 1; } if (! $tblname_start_offset) { $tblname_start_offset = mb_strpos($row, '.', $db_name_offset); } $show_grants_dbname = mb_substr( $row, $db_name_offset, $tblname_start_offset - $db_name_offset ); $show_grants_dbname = Util::unQuote($show_grants_dbname, '`'); $show_grants_str = mb_substr( $row, 6, mb_strpos($row, ' ON ') - 6 ); $show_grants_tblname = mb_substr( $row, $tblname_start_offset + 1, $tblname_end_offset - $tblname_start_offset - 1 ); $show_grants_tblname = Util::unQuote($show_grants_tblname, '`'); return [ $show_grants_str, $show_grants_dbname, $show_grants_tblname, ]; } /** * Check if user has required privileges for * performing 'Adjust privileges' operations * * @param string $show_grants_str string containing grants for user * @param string $show_grants_dbname name of db extracted from grant string * @param string $show_grants_tblname name of table extracted from grant string * * @return void */ public function checkRequiredPrivilegesForAdjust( string $show_grants_str, string $show_grants_dbname, string $show_grants_tblname ): void { // '... ALL PRIVILEGES ON *.* ...' OR '... ALL PRIVILEGES ON `mysql`.* ..' // OR // SELECT, INSERT, UPDATE, DELETE .... ON *.* OR `mysql`.* if ($show_grants_str == 'ALL' || $show_grants_str == 'ALL PRIVILEGES' || (mb_strpos( $show_grants_str, 'SELECT, INSERT, UPDATE, DELETE' ) !== false) ) { if ($show_grants_dbname == '*' && $show_grants_tblname == '*' ) { $GLOBALS['col_priv'] = true; $GLOBALS['db_priv'] = true; $GLOBALS['proc_priv'] = true; $GLOBALS['table_priv'] = true; if ($show_grants_str == 'ALL PRIVILEGES' || $show_grants_str == 'ALL' ) { $GLOBALS['is_reload_priv'] = true; } } // check for specific tables in `mysql` db // Ex. '... ALL PRIVILEGES on `mysql`.`columns_priv` .. ' if ($show_grants_dbname == 'mysql') { switch ($show_grants_tblname) { case "columns_priv": $GLOBALS['col_priv'] = true; break; case "db": $GLOBALS['db_priv'] = true; break; case "procs_priv": $GLOBALS['proc_priv'] = true; break; case "tables_priv": $GLOBALS['table_priv'] = true; break; case "*": $GLOBALS['col_priv'] = true; $GLOBALS['db_priv'] = true; $GLOBALS['proc_priv'] = true; $GLOBALS['table_priv'] = true; break; default: } } } } /** * sets privilege information extracted from SHOW GRANTS result * * Detection for some CREATE privilege. * * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink * (no control user needed) and we don't have to try any other method for * detection * * @todo fix to get really all privileges, not only explicitly defined for this user * from MySQL manual: (https://dev.mysql.com/doc/refman/5.0/en/show-grants.html) * SHOW GRANTS displays only the privileges granted explicitly to the named * account. Other privileges might be available to the account, but they are not * displayed. For example, if an anonymous account exists, the named account * might be able to use its privileges, but SHOW GRANTS will not display them. * * @return void */ private function analyseShowGrant(): void { if (Util::cacheExists('is_create_db_priv')) { $GLOBALS['is_create_db_priv'] = Util::cacheGet( 'is_create_db_priv' ); $GLOBALS['is_reload_priv'] = Util::cacheGet( 'is_reload_priv' ); $GLOBALS['db_to_create'] = Util::cacheGet( 'db_to_create' ); $GLOBALS['dbs_where_create_table_allowed'] = Util::cacheGet( 'dbs_where_create_table_allowed' ); $GLOBALS['dbs_to_test'] = Util::cacheGet( 'dbs_to_test' ); $GLOBALS['db_priv'] = Util::cacheGet( 'db_priv' ); $GLOBALS['col_priv'] = Util::cacheGet( 'col_priv' ); $GLOBALS['table_priv'] = Util::cacheGet( 'table_priv' ); $GLOBALS['proc_priv'] = Util::cacheGet( 'proc_priv' ); return; } // defaults $GLOBALS['is_create_db_priv'] = false; $GLOBALS['is_reload_priv'] = false; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'] = []; $GLOBALS['dbs_to_test'] = $this->dbi->getSystemSchemas(); $GLOBALS['proc_priv'] = false; $GLOBALS['db_priv'] = false; $GLOBALS['col_priv'] = false; $GLOBALS['table_priv'] = false; $rs_usr = $this->dbi->tryQuery('SHOW GRANTS'); if (! $rs_usr) { return; } $re0 = '(^|(\\\\\\\\)+|[^\\\\])'; // non-escaped wildcards $re1 = '(^|[^\\\\])(\\\)+'; // escaped wildcards while ($row = $this->dbi->fetchRow($rs_usr)) { list( $show_grants_str, $show_grants_dbname, $show_grants_tblname ) = $this->getItemsFromShowGrantsRow($row[0]); if ($show_grants_dbname == '*') { if ($show_grants_str != 'USAGE') { $GLOBALS['dbs_to_test'] = false; } } elseif ($GLOBALS['dbs_to_test'] !== false) { $GLOBALS['dbs_to_test'][] = $show_grants_dbname; } if (mb_strpos($show_grants_str, 'RELOAD') !== false) { $GLOBALS['is_reload_priv'] = true; } // check for the required privileges for adjust $this->checkRequiredPrivilegesForAdjust( $show_grants_str, $show_grants_dbname, $show_grants_tblname ); /** * @todo if we find CREATE VIEW but not CREATE, do not offer * the create database dialog box */ if ($show_grants_str == 'ALL' || $show_grants_str == 'ALL PRIVILEGES' || $show_grants_str == 'CREATE' || strpos($show_grants_str, 'CREATE,') !== false ) { if ($show_grants_dbname == '*') { // a global CREATE privilege $GLOBALS['is_create_db_priv'] = true; $GLOBALS['is_reload_priv'] = true; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'][] = '*'; // @todo we should not break here, cause GRANT ALL *.* // could be revoked by a later rule like GRANT SELECT ON db.* break; } else { // this array may contain wildcards $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname; $dbname_to_test = Util::backquote($show_grants_dbname); if ($GLOBALS['is_create_db_priv']) { // no need for any more tests if we already know this continue; } // does this db exist? if ((preg_match('/' . $re0 . '%|_/', $show_grants_dbname) && ! preg_match('/\\\\%|\\\\_/', $show_grants_dbname)) || (! $this->dbi->tryQuery( 'USE ' . preg_replace( '/' . $re1 . '(%|_)/', '\\1\\3', $dbname_to_test ) ) && mb_substr($this->dbi->getError(), 1, 4) != 1044) ) { /** * Do not handle the underscore wildcard * (this case must be rare anyway) */ $GLOBALS['db_to_create'] = preg_replace( '/' . $re0 . '%/', '\\1', $show_grants_dbname ); $GLOBALS['db_to_create'] = preg_replace( '/' . $re1 . '(%|_)/', '\\1\\3', $GLOBALS['db_to_create'] ); $GLOBALS['is_create_db_priv'] = true; /** * @todo collect $GLOBALS['db_to_create'] into an array, * to display a drop-down in the "Create database" dialog */ // we don't break, we want all possible databases //break; } // end if } // end elseif } // end if } // end while $this->dbi->freeResult($rs_usr); // must also cacheUnset() them in // PhpMyAdmin\Plugins\Auth\AuthenticationCookie Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv']); Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv']); Util::cacheSet('db_to_create', $GLOBALS['db_to_create']); Util::cacheSet( 'dbs_where_create_table_allowed', $GLOBALS['dbs_where_create_table_allowed'] ); Util::cacheSet('dbs_to_test', $GLOBALS['dbs_to_test']); Util::cacheSet('proc_priv', $GLOBALS['proc_priv']); Util::cacheSet('table_priv', $GLOBALS['table_priv']); Util::cacheSet('col_priv', $GLOBALS['col_priv']); Util::cacheSet('db_priv', $GLOBALS['db_priv']); } /** * Get user's global privileges and some db-specific privileges * * @return void */ public function getPrivileges(): void { $username = ''; $current = $this->dbi->getCurrentUserAndHost(); if (! empty($current)) { list($username, ) = $current; } // If MySQL is started with --skip-grant-tables if ($username === '') { $GLOBALS['is_create_db_priv'] = true; $GLOBALS['is_reload_priv'] = true; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'] = ['*']; $GLOBALS['dbs_to_test'] = false; $GLOBALS['db_priv'] = true; $GLOBALS['col_priv'] = true; $GLOBALS['table_priv'] = true; $GLOBALS['proc_priv'] = true; } else { $this->analyseShowGrant(); } } }