2010-03-28 22:10:10 +00:00
|
|
|
<?xml version="1.0" encoding="utf-8"?>
|
2009-07-11 06:57:16 +00:00
|
|
|
<!-- $Revision$ -->
|
2002-04-15 00:12:54 +00:00
|
|
|
<!-- splitted from ./en/functions/exec.xml, last change in rev 1.2 -->
|
2007-06-20 22:25:43 +00:00
|
|
|
<refentry xml:id="function.escapeshellcmd" xmlns="http://docbook.org/ns/docbook">
|
2005-04-08 20:14:52 +00:00
|
|
|
<refnamediv>
|
|
|
|
<refname>escapeshellcmd</refname>
|
|
|
|
<refpurpose>Escape shell metacharacters</refpurpose>
|
|
|
|
</refnamediv>
|
2005-04-08 23:18:40 +00:00
|
|
|
|
|
|
|
<refsect1 role="description">
|
2005-04-08 20:14:52 +00:00
|
|
|
&reftitle.description;
|
|
|
|
<methodsynopsis>
|
|
|
|
<type>string</type><methodname>escapeshellcmd</methodname>
|
|
|
|
<methodparam><type>string</type><parameter>command</parameter></methodparam>
|
|
|
|
</methodsynopsis>
|
|
|
|
<para>
|
|
|
|
<function>escapeshellcmd</function> escapes any characters in a
|
|
|
|
string that might be used to trick a shell command into executing
|
|
|
|
arbitrary commands. This function should be used to make sure
|
|
|
|
that any data coming from user input is escaped before this data
|
|
|
|
is passed to the <function>exec</function> or
|
|
|
|
<function>system</function> functions, or to the <link
|
|
|
|
linkend="language.operators.execution">backtick
|
2005-04-08 23:18:40 +00:00
|
|
|
operator</link>.
|
|
|
|
</para>
|
2005-11-09 13:03:23 +00:00
|
|
|
<para>
|
|
|
|
Following characters are preceded by a backslash:
|
2016-08-23 11:04:01 +00:00
|
|
|
<literal>&#;`|*?~<>^()[]{}$\</literal>, <literal>\x0A</literal>
|
2005-11-09 13:03:23 +00:00
|
|
|
and <literal>\xFF</literal>. <literal>'</literal> and <literal>"</literal>
|
2020-05-25 15:53:30 +00:00
|
|
|
are escaped only if they are not paired. On Windows, all these characters
|
|
|
|
plus <literal>%</literal> and <literal>!</literal> are preceded by a caret
|
|
|
|
(<literal>^</literal>).
|
2005-11-09 13:03:23 +00:00
|
|
|
</para>
|
2005-04-08 23:18:40 +00:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1 role="parameters">
|
|
|
|
&reftitle.parameters;
|
|
|
|
<para>
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term><parameter>command</parameter></term>
|
|
|
|
<listitem>
|
|
|
|
<para>
|
|
|
|
The command that will be escaped.
|
|
|
|
</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</para>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1 role="returnvalues">
|
|
|
|
&reftitle.returnvalues;
|
2005-04-08 20:14:52 +00:00
|
|
|
<para>
|
2005-04-08 23:18:40 +00:00
|
|
|
The escaped string.
|
|
|
|
</para>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1 role="examples">
|
|
|
|
&reftitle.examples;
|
|
|
|
<para>
|
|
|
|
<example>
|
|
|
|
<title><function>escapeshellcmd</function> example</title>
|
2005-04-08 20:14:52 +00:00
|
|
|
<programlisting role="php">
|
2002-04-15 00:12:54 +00:00
|
|
|
<![CDATA[
|
2003-06-16 19:43:41 +00:00
|
|
|
<?php
|
2012-05-16 19:35:11 +00:00
|
|
|
// We allow arbitrary number of arguments intentionally here.
|
2011-11-19 23:04:42 +00:00
|
|
|
$command = './configure '.$_POST['configure_options'];
|
|
|
|
|
|
|
|
$escaped_command = escapeshellcmd($command);
|
2003-06-16 19:43:41 +00:00
|
|
|
|
2011-11-19 23:04:42 +00:00
|
|
|
system($escaped_command);
|
2003-06-16 19:43:41 +00:00
|
|
|
?>
|
2002-04-15 00:12:54 +00:00
|
|
|
]]>
|
2005-04-08 20:14:52 +00:00
|
|
|
</programlisting>
|
2005-04-08 23:18:40 +00:00
|
|
|
</example>
|
2005-04-08 20:14:52 +00:00
|
|
|
</para>
|
2005-04-08 23:18:40 +00:00
|
|
|
</refsect1>
|
|
|
|
|
2011-11-19 23:04:42 +00:00
|
|
|
<refsect1 role="notes">
|
|
|
|
<warning xmlns="http://docbook.org/ns/docbook">
|
|
|
|
<para>
|
|
|
|
<function>escapeshellcmd</function> should be used on the whole
|
|
|
|
command string, and it still allows the attacker to pass
|
|
|
|
arbitrary number of arguments. For escaping a single argument
|
|
|
|
<function>escapeshellarg</function> should be used instead.
|
|
|
|
</para>
|
|
|
|
</warning>
|
2021-04-05 16:39:54 +00:00
|
|
|
<warning xmlns="http://docbook.org/ns/docbook">
|
|
|
|
<para>
|
|
|
|
Spaces will not be escaped by <function>escapeshellcmd</function>
|
|
|
|
which can be problematic on Windows with paths like:
|
|
|
|
<literal>C:\Program Files\ProgramName\program.exe</literal>.
|
|
|
|
This can be mitigated using the following code snippet:
|
|
|
|
<programlisting role="php">
|
|
|
|
<![CDATA[
|
|
|
|
<?php
|
|
|
|
$cmd = preg_replace('`(?<!^) `', '^ ', escapeshellcmd($cmd));
|
|
|
|
]]>
|
|
|
|
</programlisting>
|
|
|
|
</para>
|
|
|
|
</warning>
|
2011-11-19 23:04:42 +00:00
|
|
|
</refsect1>
|
|
|
|
|
2005-04-08 23:18:40 +00:00
|
|
|
<refsect1 role="seealso">
|
|
|
|
&reftitle.seealso;
|
2005-04-08 20:14:52 +00:00
|
|
|
<para>
|
2005-04-08 23:18:40 +00:00
|
|
|
<simplelist>
|
|
|
|
<member><function>escapeshellarg</function></member>
|
|
|
|
<member><function>exec</function></member>
|
|
|
|
<member><function>popen</function></member>
|
|
|
|
<member><function>system</function></member>
|
|
|
|
<member><link linkend="language.operators.execution">backtick operator</link></member>
|
|
|
|
</simplelist>
|
2005-04-08 20:14:52 +00:00
|
|
|
</para>
|
|
|
|
</refsect1>
|
|
|
|
</refentry>
|
2002-04-15 00:12:54 +00:00
|
|
|
|
|
|
|
<!-- Keep this comment at the end of the file
|
|
|
|
Local variables:
|
|
|
|
mode: sgml
|
|
|
|
sgml-omittag:t
|
|
|
|
sgml-shorttag:t
|
|
|
|
sgml-minimize-attributes:nil
|
|
|
|
sgml-always-quote-attributes:t
|
|
|
|
sgml-indent-step:1
|
|
|
|
sgml-indent-data:t
|
|
|
|
indent-tabs-mode:nil
|
|
|
|
sgml-parent-document:nil
|
2009-09-25 07:04:39 +00:00
|
|
|
sgml-default-dtd-file:"~/.phpdoc/manual.ced"
|
2002-04-15 00:12:54 +00:00
|
|
|
sgml-exposed-tags:nil
|
|
|
|
sgml-local-catalogs:nil
|
|
|
|
sgml-local-ecat-files:nil
|
|
|
|
End:
|
|
|
|
vim600: syn=xml fen fdm=syntax fdl=2 si
|
|
|
|
vim: et tw=78 syn=sgml
|
|
|
|
vi: ts=1 sw=1
|
|
|
|
-->
|