coder-8.x-3.x-dev/coder_sniffer/DrupalPractice/Sniffs/FunctionCalls/InsecureUnserializeSniff.php
coder_sniffer/DrupalPractice/Sniffs/FunctionCalls/InsecureUnserializeSniff.php
<?php
/**
* \DrupalPractice\Sniffs\FunctionCalls\InsecureUnserializeSniff
*
* @category PHP
* @package PHP_CodeSniffer
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
namespace DrupalPractice\Sniffs\FunctionCalls;
use PHP_CodeSniffer\Files\File;
use Drupal\Sniffs\Semantics\FunctionCall;
/**
* Check that unserialize() limits classes that may be unserialized.
*
* @category PHP
* @package PHP_CodeSniffer
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
class InsecureUnserializeSniff extends FunctionCall
{
/**
* Returns an array of function names this test wants to listen for.
*
* @return array<string>
*/
public function registerFunctionNames()
{
return ['unserialize'];
}
/**
* Processes this function call.
*
* @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned.
* @param int $stackPtr The position of the function call in
* the stack.
* @param int $openBracket The position of the opening
* parenthesis in the stack.
* @param int $closeBracket The position of the closing
* parenthesis in the stack.
*
* @return void
*/
public function processFunctionCall(
File $phpcsFile,
$stackPtr,
$openBracket,
$closeBracket
) {
$tokens = $phpcsFile->getTokens();
$argument = $this->getArgument(2);
if ($argument === false) {
$this->fail($phpcsFile, $closeBracket);
return;
}
$allowedClassesKeyStart = $phpcsFile->findNext(T_CONSTANT_ENCAPSED_STRING, $argument['start'], $argument['end'], false, '\'allowed_classes\'');
if ($allowedClassesKeyStart === false) {
$allowedClassesKeyStart = $phpcsFile->findNext(T_CONSTANT_ENCAPSED_STRING, $argument['start'], $argument['end'], false, '"allowed_classes"');
}
if ($allowedClassesKeyStart === false) {
$this->fail($phpcsFile, $argument['end']);
return;
}
$allowedClassesArrow = $phpcsFile->findNext(T_DOUBLE_ARROW, $allowedClassesKeyStart, $argument['end'], false);
if ($allowedClassesArrow === false) {
$this->fail($phpcsFile, $argument['end']);
return;
}
$allowedClassesValue = $phpcsFile->findNext(T_WHITESPACE, ($allowedClassesArrow + 1), $argument['end'], true);
if ($tokens[$allowedClassesValue]['code'] === T_TRUE) {
$this->fail($phpcsFile, $allowedClassesValue);
}
}
/**
* Record a violation of the standard.
*
* @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned.
* @param int $position The stack position of the violation.
*
* @return void
*/
protected function fail(File $phpcsFile, int $position)
{
$phpcsFile->addError('unserialize() is insecure unless allowed classes are limited. Use a safe format like JSON or use the allowed_classes option.', $position, 'InsecureUnserialize');
}
}
