123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398 |
- <?php
- /* Copyright (C) 2010-2013 Laurent Destailleur <eldy@users.sourceforge.net>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- * or see http://www.gnu.org/
- */
- /**
- * \file test/phpunit/CoreTest.php
- * \ingroup test
- * \brief PHPUnit test
- * \remarks To run this script as CLI: phpunit filename.php
- */
- global $conf,$user,$langs,$db;
- //define('TEST_DB_FORCE_TYPE','mysql'); // This is to force using mysql driver
- //require_once 'PHPUnit/Autoload.php';
- //require_once dirname(__FILE__).'/../../htdocs/master.inc.php';
- if (! defined('NOREQUIREUSER')) define('NOREQUIREUSER','1');
- if (! defined('NOREQUIREDB')) define('NOREQUIREDB','1');
- if (! defined('NOREQUIRESOC')) define('NOREQUIRESOC','1');
- if (! defined('NOREQUIRETRAN')) define('NOREQUIRETRAN','1');
- if (! defined('NOCSRFCHECK')) define('NOCSRFCHECK','1');
- if (! defined('NOTOKENRENEWAL')) define('NOTOKENRENEWAL','1');
- if (! defined('NOREQUIREMENU')) define('NOREQUIREMENU','1'); // If there is no menu to show
- if (! defined('NOREQUIREHTML')) define('NOREQUIREHTML','1'); // If we don't need to load the html.form.class.php
- if (! defined('NOREQUIREAJAX')) define('NOREQUIREAJAX','1');
- if (! defined("NOLOGIN")) define("NOLOGIN",'1'); // If this page is public (can be called outside logged session)
- /**
- * Class to test core functions
- *
- * @backupGlobals disabled
- * @backupStaticAttributes enabled
- * @remarks backupGlobals must be disabled to have db,conf,user and lang not erased.
- */
- class CoreTest extends PHPUnit_Framework_TestCase
- {
- protected $savconf;
- protected $savuser;
- protected $savlangs;
- protected $savdb;
- /**
- * Constructor
- * We save global variables into local variables
- *
- * @return CoreTest
- */
- function __construct()
- {
- parent::__construct();
- //$this->sharedFixture
- global $conf,$user,$langs,$db;
- $this->savconf=$conf;
- $this->savuser=$user;
- $this->savlangs=$langs;
- $this->savdb=$db;
- //print __METHOD__." db->type=".$db->type." user->id=".$user->id;
- //print " - db ".$db->db;
- print "\n";
- }
- // Static methods
- public static function setUpBeforeClass()
- {
- global $conf,$user,$langs,$db;
- //$db->begin(); // This is to have all actions inside a transaction even if test launched without suite.
- print __METHOD__."\n";
- }
- // tear down after class
- public static function tearDownAfterClass()
- {
- global $conf,$user,$langs,$db;
- //$db->rollback();
- print __METHOD__."\n";
- }
- /**
- * Init phpunit tests
- *
- * @return void
- */
- protected function setUp()
- {
- global $conf,$user,$langs,$db;
- $conf=$this->savconf;
- $user=$this->savuser;
- $langs=$this->savlangs;
- $db=$this->savdb;
- print __METHOD__."\n";
- }
- /**
- * End phpunit tests
- *
- * @return void
- */
- protected function tearDown()
- {
- print __METHOD__."\n";
- }
- /**
- * testDetectURLROOT
- *
- * @return void
- */
- public function testDetectURLROOT()
- {
- global $dolibarr_main_prod;
- global $dolibarr_main_url_root;
- global $dolibarr_main_data_root;
- global $dolibarr_main_document_root;
- global $dolibarr_main_data_root_alt;
- global $dolibarr_main_document_root_alt;
- global $dolibarr_main_db_host;
- global $dolibarr_main_db_port;
- global $dolibarr_main_db_type;
- global $dolibarr_main_db_prefix;
- $testtodo=0;
- // Case 1:
- // Test for subdir dolibarrnew (that point to htdocs) in root directory /var/www
- // URL: http://localhost/dolibarrnew/admin/system/phpinfo.php
- // To prepare this test:
- // - Create link from htdocs to /var/www/dolibarrnew
- // - Put into conf.php $dolibarr_main_document_root='/var/www/dolibarrnew';
- if ($testtodo == 1) {
- $_SERVER["HTTPS"]='';
- $_SERVER["SERVER_NAME"]='localhost';
- $_SERVER["SERVER_PORT"]='80';
- $_SERVER["DOCUMENT_ROOT"]='/var/www';
- $_SERVER["SCRIPT_NAME"]='/dolibarrnew/admin/system/phpinfo.php';
- $expectedresult='/dolibarrnew';
- }
- // Case 2:
- // Test for subdir aaa (that point to dolibarr) in root directory /var/www
- // URL: http://localhost/aaa/htdocs/admin/system/phpinfo.php
- // To prepare this test:
- // - Create link from dolibarr to /var/www/aaa
- // - Put into conf.php $dolibarr_main_document_root='/var/www/aaa/htdocs';
- if ($testtodo == 2) {
- $_SERVER["HTTPS"]='';
- $_SERVER["SERVER_NAME"]='localhost';
- $_SERVER["SERVER_PORT"]='80';
- $_SERVER["DOCUMENT_ROOT"]='/var/www';
- $_SERVER["SCRIPT_NAME"]='/aaa/htdocs/admin/system/phpinfo.php';
- $expectedresult='/aaa/htdocs';
- }
- // Case 3:
- // Test for virtual host localhostdolibarrnew that point to htdocs directory with
- // a direct document root
- // URL: http://localhostdolibarrnew/admin/system/phpinfo.php
- // To prepare this test:
- // - Create virtual host localhostdolibarrnew that point to /home/ldestailleur/git/dolibarr/htdocs
- // - Put into conf.php $dolibarr_main_document_root='/home/ldestailleur/git/dolibarr/htdocs';
- if ($testtodo == 3) {
- $_SERVER["HTTPS"]='';
- $_SERVER["SERVER_NAME"]='localhostdolibarrnew';
- $_SERVER["SERVER_PORT"]='80';
- $_SERVER["DOCUMENT_ROOT"]='/home/ldestailleur/git/dolibarr/htdocs';
- $_SERVER["SCRIPT_NAME"]='/admin/system/phpinfo.php';
- $expectedresult='';
- }
- // Case 4:
- // Test for virtual host localhostdolibarrnew that point to htdocs directory with
- // a symbolic link
- // URL: http://localhostdolibarrnew/admin/system/phpinfo.php
- if ($testtodo == 4) {
- $_SERVER["HTTPS"]='';
- $_SERVER["SERVER_NAME"]='localhostdolibarrnew';
- $_SERVER["SERVER_PORT"]='80';
- $_SERVER["DOCUMENT_ROOT"]='/var/www/dolibarr'; // This is a link that point to /home/ldestail/workspace/dolibarr/htdocs
- $_SERVER["SCRIPT_NAME"]='/admin/system/phpinfo.php';
- $expectedresult='';
- }
- // Case 5:
- // Test for alias /dolibarralias, Test when using nginx, Test when using lighttpd
- // URL: http://localhost/dolibarralias/admin/system/phpinfo.php
- // To prepare this test:
- // - Copy content of dolibarr project into /var/www/dolibarr
- // - Put into conf.php $dolibarr_main_document_root='/var/www/dolibarr/htdocs';
- // - Put into conf.php $dolibarr_main_url_root='http://localhost/dolibarralias'; (because autodetect will fails in this case)
- if ($testtodo == 5) {
- $_SERVER["HTTPS"]='';
- $_SERVER["SERVER_NAME"]='localhost';
- $_SERVER["SERVER_PORT"]='80';
- $_SERVER["DOCUMENT_ROOT"]='/var/www';
- $_SERVER["SCRIPT_NAME"]='/dolibarralias/admin/system/phpinfo.php';
- $expectedresult='/dolibarralias';
- }
- // Force to rerun filefunc.inc.php
- include dirname(__FILE__).'/../../htdocs/filefunc.inc.php';
- if ($testtodo != 0)
- {
- print __METHOD__." DOL_MAIN_URL_ROOT=".DOL_MAIN_URL_ROOT."\n";
- print __METHOD__." DOL_URL_ROOT=".DOL_URL_ROOT."\n";
- $this->assertEquals($expectedresult, DOL_URL_ROOT);
- }
- return true;
- }
- /**
- * testSqlAndScriptInject
- *
- * @return void
- */
- public function testSqlAndScriptInject()
- {
- global $dolibarr_main_prod;
- global $dolibarr_main_url_root;
- global $dolibarr_main_data_root;
- global $dolibarr_main_document_root;
- global $dolibarr_main_data_root_alt;
- global $dolibarr_main_document_root_alt;
- global $dolibarr_main_db_host;
- global $dolibarr_main_db_port;
- global $dolibarr_main_db_type;
- global $dolibarr_main_db_prefix;
- // This is code copied from main.inc.php !!!!!!!!!!!!!!!
- /**
- * Security: SQL Injection and XSS Injection (scripts) protection (Filters on GET, POST, PHP_SELF).
- *
- * @param string $val Value
- * @param string $type 1=GET, 0=POST, 2=PHP_SELF
- * @return int >0 if there is an injection
- */
- function test_sql_and_script_inject($val, $type)
- {
- $inj = 0;
- // For SQL Injection (only GET and POST are used to be included into bad escaped SQL requests)
- if ($type != 2)
- {
- $inj += preg_match('/delete\s+from/i', $val);
- $inj += preg_match('/create\s+table/i', $val);
- $inj += preg_match('/update.+set.+=/i', $val);
- $inj += preg_match('/insert\s+into/i', $val);
- $inj += preg_match('/select.+from/i', $val);
- $inj += preg_match('/union.+select/i', $val);
- $inj += preg_match('/into\s+(outfile|dumpfile)/i', $val);
- $inj += preg_match('/(\.\.%2f)+/i', $val);
- }
- // For XSS Injection done by adding javascript with script
- // This is all cases a browser consider text is javascript:
- // When it found '<script', 'javascript:', '<style', 'onload\s=' on body tag, '="&' on a tag size with old browsers
- // All examples on page: http://ha.ckers.org/xss.html#XSScalc
- // More on https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- $inj += preg_match('/<script/i', $val);
- $inj += preg_match('/<iframe/i', $val);
- $inj += preg_match('/Set\.constructor/i', $val); // ECMA script 6
- if (! defined('NOSTYLECHECK')) $inj += preg_match('/<style/i', $val);
- $inj += preg_match('/base[\s]+href/si', $val);
- $inj += preg_match('/<.*onmouse/si', $val); // onmousexxx can be set on img or any html tag like <img title='...' onmouseover=alert(1)>
- $inj += preg_match('/onerror\s*=/i', $val); // onerror can be set on img or any html tag like <img title='...' onerror = alert(1)>
- $inj += preg_match('/onfocus\s*=/i', $val); // onfocus can be set on input text html tag like <input type='text' value='...' onfocus = alert(1)>
- $inj += preg_match('/onload\s*=/i', $val); // onload can be set on svg tag <svg/onload=alert(1)> or other tag like body <body onload=alert(1)>
- //$inj += preg_match('/on[A-Z][a-z]+\*=/', $val); // To lock event handlers onAbort(), ...
- $inj += preg_match('/:|:|:/i', $val); // refused string ':' encoded (no reason to have it encoded) to lock 'javascript:...'
- //if ($type == 1)
- //{
- $inj += preg_match('/javascript:/i', $val);
- $inj += preg_match('/vbscript:/i', $val);
- //}
- // For XSS Injection done by adding javascript closing html tags like with onmousemove, etc... (closing a src or href tag with not cleaned param)
- if ($type == 1) $inj += preg_match('/"/i', $val); // We refused " in GET parameters value
- if ($type == 2) $inj += preg_match('/[;"]/', $val); // PHP_SELF is a file system path. It can contains spaces.
- return $inj;
- }
- // Run tests
- // More on https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- // Should be OK
- $expectedresult=0;
- $_SERVER["PHP_SELF"]='/DIR WITH SPACE/htdocs/admin/index.php?mainmenu=home&leftmenu=setup&username=weservices';
- $result=test_sql_and_script_inject($_SERVER["PHP_SELF"], 2);
- $this->assertEquals($expectedresult, $result, 'Error on test_sql_and_script_inject 1a');
- // Should detect XSS
- $expectedresult=1;
- $_SERVER["PHP_SELF"]='/DIR WITH SPACE/htdocs/admin/index.php?mainmenu=home&leftmenu=setup&username=weservices;badaction';
- $result=test_sql_and_script_inject($_SERVER["PHP_SELF"], 2);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject 1b');
- $test="<img src='1.jpg' onerror =javascript:alert('XSS')>";
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa');
- $test="<img src='1.jpg' onerror =javascript:alert('XSS')>";
- $result=test_sql_and_script_inject($test, 2);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa2');
- $test='<IMG SRC=# onmouseover="alert(1)">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa3');
- $test='<IMG SRC onmouseover="alert(1)">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa4');
- $test='<IMG onmouseover="alert(1)">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa5');
- $test='<IMG SRC=/ onerror="alert(1)">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa6');
- $test='<IMG SRC="  javascript:alert(1);">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject aaa7');
- $test='<IMG SRC=javascript:alert('XSS')>';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject bbb');
- $test='<SCRIPT SRC=http://xss.rocks/xss.js></SCRIPT>';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject ccc');
- $test='<IMG SRC="javascript:alert(\'XSS\');">';
- $result=test_sql_and_script_inject($test, 1);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject ddd');
- $test='<IMG """><SCRIPT>alert("XSS")</SCRIPT>">';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject eee');
- $test='<!-- Google analytics -->
- <script>
- (function(i,s,o,g,r,a,m){i[\'GoogleAnalyticsObject\']=r;i[r]=i[r]||function(){
- (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
- m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
- })(window,document,\'script\',\'https://www.google-analytics.com/analytics.js\',\'ga\');
- ga(\'create\',\'UA-99999999-9\', \'auto\');
- ga(\'send\', \'pageview\');
- </script>';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject eee');
- $test="<IMG SRC=\"jav\tascript:alert('XSS');\">"; // Is locked by some brwoser like chrome because the default directive no-referrer-when-downgrade is sent when requesting the SRC and then refused because of browser protection on img src load without referrer.
- $test="<IMG SRC=\"jav
ascript:alert('XSS');\">"; // Same
- $test='<SCRIPT/XSS SRC="http://xss.rocks/xss.js"></SCRIPT>';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject fff1');
- $test='<SCRIPT/SRC="http://xss.rocks/xss.js"></SCRIPT>';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject fff2');
- // This case seems to be filtered by browsers now.
- $test='<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(1)>';
- //$result=test_sql_and_script_inject($test, 0);
- //$this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject ggg');
- $test='<iframe src=http://xss.rocks/scriptlet.html <';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject hhh');
- $test='Set.constructor`alert\x281\x29```';
- $result=test_sql_and_script_inject($test, 0);
- $this->assertGreaterThanOrEqual($expectedresult, $result, 'Error on test_sql_and_script_inject iii');
- }
- }
|