123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338 |
- <?php
- /* vim: set expandtab sw=4 ts=4 sts=4: */
- /**
- * Get user's global privileges and some db-specific privileges
- *
- * @package PhpMyAdmin
- */
- namespace PhpMyAdmin;
- use PhpMyAdmin\DatabaseInterface;
- use PhpMyAdmin\Util;
- /**
- * PhpMyAdmin\CheckUserPrivileges class
- *
- * @package PhpMyAdmin
- */
- class CheckUserPrivileges
- {
- /**
- * @var DatabaseInterface
- */
- private $dbi;
- /**
- * Constructor
- *
- * @param DatabaseInterface $dbi DatabaseInterface object
- */
- public function __construct(DatabaseInterface $dbi)
- {
- $this->dbi = $dbi;
- }
- /**
- * Extracts details from a result row of a SHOW GRANT query
- *
- * @param string $row grant row
- *
- * @return array
- */
- public function getItemsFromShowGrantsRow($row)
- {
- $db_name_offset = mb_strpos($row, ' ON ') + 4;
- $tblname_end_offset = mb_strpos($row, ' TO ');
- $tblname_start_offset = false;
- if ($__tblname_start_offset = mb_strpos($row, '`.', $db_name_offset)) {
- if ($__tblname_start_offset < $tblname_end_offset) {
- $tblname_start_offset = $__tblname_start_offset + 1;
- }
- }
- if (!$tblname_start_offset) {
- $tblname_start_offset = mb_strpos($row, '.', $db_name_offset);
- }
- $show_grants_dbname = mb_substr(
- $row,
- $db_name_offset,
- $tblname_start_offset - $db_name_offset
- );
- $show_grants_dbname = Util::unQuote($show_grants_dbname, '`');
- $show_grants_str = mb_substr(
- $row,
- 6,
- (mb_strpos($row, ' ON ') - 6)
- );
- $show_grants_tblname = mb_substr(
- $row,
- $tblname_start_offset + 1,
- $tblname_end_offset - $tblname_start_offset - 1
- );
- $show_grants_tblname = Util::unQuote($show_grants_tblname, '`');
- return array(
- $show_grants_str,
- $show_grants_dbname,
- $show_grants_tblname
- );
- }
- /**
- * Check if user has required privileges for
- * performing 'Adjust privileges' operations
- *
- * @param string $show_grants_str string containing grants for user
- * @param string $show_grants_dbname name of db extracted from grant string
- * @param string $show_grants_tblname name of table extracted from grant string
- *
- * @return void
- */
- public function checkRequiredPrivilegesForAdjust(
- $show_grants_str,
- $show_grants_dbname,
- $show_grants_tblname
- ) {
- // '... ALL PRIVILEGES ON *.* ...' OR '... ALL PRIVILEGES ON `mysql`.* ..'
- // OR
- // SELECT, INSERT, UPDATE, DELETE .... ON *.* OR `mysql`.*
- if ($show_grants_str == 'ALL'
- || $show_grants_str == 'ALL PRIVILEGES'
- || (mb_strpos(
- $show_grants_str, 'SELECT, INSERT, UPDATE, DELETE'
- ) !== false)
- ) {
- if ($show_grants_dbname == '*'
- && $show_grants_tblname == '*'
- ) {
- $GLOBALS['col_priv'] = true;
- $GLOBALS['db_priv'] = true;
- $GLOBALS['proc_priv'] = true;
- $GLOBALS['table_priv'] = true;
- if ($show_grants_str == 'ALL PRIVILEGES'
- || $show_grants_str == 'ALL'
- ) {
- $GLOBALS['is_reload_priv'] = true;
- }
- }
- // check for specific tables in `mysql` db
- // Ex. '... ALL PRIVILEGES on `mysql`.`columns_priv` .. '
- if ($show_grants_dbname == 'mysql') {
- switch ($show_grants_tblname) {
- case "columns_priv":
- $GLOBALS['col_priv'] = true;
- break;
- case "db":
- $GLOBALS['db_priv'] = true;
- break;
- case "procs_priv":
- $GLOBALS['proc_priv'] = true;
- break;
- case "tables_priv":
- $GLOBALS['table_priv'] = true;
- break;
- case "*":
- $GLOBALS['col_priv'] = true;
- $GLOBALS['db_priv'] = true;
- $GLOBALS['proc_priv'] = true;
- $GLOBALS['table_priv'] = true;
- break;
- default:
- }
- }
- }
- }
- /**
- * sets privilege information extracted from SHOW GRANTS result
- *
- * Detection for some CREATE privilege.
- *
- * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink
- * (no control user needed) and we don't have to try any other method for
- * detection
- *
- * @todo fix to get really all privileges, not only explicitly defined for this user
- * from MySQL manual: (https://dev.mysql.com/doc/refman/5.0/en/show-grants.html)
- * SHOW GRANTS displays only the privileges granted explicitly to the named
- * account. Other privileges might be available to the account, but they are not
- * displayed. For example, if an anonymous account exists, the named account
- * might be able to use its privileges, but SHOW GRANTS will not display them.
- *
- * @return void
- */
- public function analyseShowGrant()
- {
- if (Util::cacheExists('is_create_db_priv')) {
- $GLOBALS['is_create_db_priv'] = Util::cacheGet(
- 'is_create_db_priv'
- );
- $GLOBALS['is_reload_priv'] = Util::cacheGet(
- 'is_reload_priv'
- );
- $GLOBALS['db_to_create'] = Util::cacheGet(
- 'db_to_create'
- );
- $GLOBALS['dbs_where_create_table_allowed'] = Util::cacheGet(
- 'dbs_where_create_table_allowed'
- );
- $GLOBALS['dbs_to_test'] = Util::cacheGet(
- 'dbs_to_test'
- );
- $GLOBALS['db_priv'] = Util::cacheGet(
- 'db_priv'
- );
- $GLOBALS['col_priv'] = Util::cacheGet(
- 'col_priv'
- );
- $GLOBALS['table_priv'] = Util::cacheGet(
- 'table_priv'
- );
- $GLOBALS['proc_priv'] = Util::cacheGet(
- 'proc_priv'
- );
- return;
- }
- // defaults
- $GLOBALS['is_create_db_priv'] = false;
- $GLOBALS['is_reload_priv'] = false;
- $GLOBALS['db_to_create'] = '';
- $GLOBALS['dbs_where_create_table_allowed'] = array();
- $GLOBALS['dbs_to_test'] = $this->dbi->getSystemSchemas();
- $GLOBALS['proc_priv'] = false;
- $GLOBALS['db_priv'] = false;
- $GLOBALS['col_priv'] = false;
- $GLOBALS['table_priv'] = false;
- $rs_usr = $this->dbi->tryQuery('SHOW GRANTS');
- if (! $rs_usr) {
- return;
- }
- $re0 = '(^|(\\\\\\\\)+|[^\\\\])'; // non-escaped wildcards
- $re1 = '(^|[^\\\\])(\\\)+'; // escaped wildcards
- while ($row = $this->dbi->fetchRow($rs_usr)) {
- list(
- $show_grants_str,
- $show_grants_dbname,
- $show_grants_tblname
- ) = $this->getItemsFromShowGrantsRow($row[0]);
- if ($show_grants_dbname == '*') {
- if ($show_grants_str != 'USAGE') {
- $GLOBALS['dbs_to_test'] = false;
- }
- } elseif ($GLOBALS['dbs_to_test'] !== false) {
- $GLOBALS['dbs_to_test'][] = $show_grants_dbname;
- }
- if (
- mb_strpos($show_grants_str,'RELOAD') !== false
- ) {
- $GLOBALS['is_reload_priv'] = true;
- }
- // check for the required privileges for adjust
- $this->checkRequiredPrivilegesForAdjust(
- $show_grants_str,
- $show_grants_dbname,
- $show_grants_tblname
- );
- /**
- * @todo if we find CREATE VIEW but not CREATE, do not offer
- * the create database dialog box
- */
- if ($show_grants_str == 'ALL'
- || $show_grants_str == 'ALL PRIVILEGES'
- || $show_grants_str == 'CREATE'
- || strpos($show_grants_str, 'CREATE,') !== false
- ) {
- if ($show_grants_dbname == '*') {
- // a global CREATE privilege
- $GLOBALS['is_create_db_priv'] = true;
- $GLOBALS['is_reload_priv'] = true;
- $GLOBALS['db_to_create'] = '';
- $GLOBALS['dbs_where_create_table_allowed'][] = '*';
- // @todo we should not break here, cause GRANT ALL *.*
- // could be revoked by a later rule like GRANT SELECT ON db.*
- break;
- } else {
- // this array may contain wildcards
- $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname;
- $dbname_to_test = Util::backquote($show_grants_dbname);
- if ($GLOBALS['is_create_db_priv']) {
- // no need for any more tests if we already know this
- continue;
- }
- // does this db exist?
- if ((preg_match('/' . $re0 . '%|_/', $show_grants_dbname)
- && ! preg_match('/\\\\%|\\\\_/', $show_grants_dbname))
- || (! $this->dbi->tryQuery(
- 'USE ' . preg_replace(
- '/' . $re1 . '(%|_)/', '\\1\\3', $dbname_to_test
- )
- )
- && mb_substr($this->dbi->getError(), 1, 4) != 1044)
- ) {
- /**
- * Do not handle the underscore wildcard
- * (this case must be rare anyway)
- */
- $GLOBALS['db_to_create'] = preg_replace(
- '/' . $re0 . '%/', '\\1',
- $show_grants_dbname
- );
- $GLOBALS['db_to_create'] = preg_replace(
- '/' . $re1 . '(%|_)/', '\\1\\3',
- $GLOBALS['db_to_create']
- );
- $GLOBALS['is_create_db_priv'] = true;
- /**
- * @todo collect $GLOBALS['db_to_create'] into an array,
- * to display a drop-down in the "Create database" dialog
- */
- // we don't break, we want all possible databases
- //break;
- } // end if
- } // end elseif
- } // end if
- } // end while
- $this->dbi->freeResult($rs_usr);
- // must also cacheUnset() them in
- // PhpMyAdmin\Plugins\Auth\AuthenticationCookie
- Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv']);
- Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv']);
- Util::cacheSet('db_to_create', $GLOBALS['db_to_create']);
- Util::cacheSet(
- 'dbs_where_create_table_allowed',
- $GLOBALS['dbs_where_create_table_allowed']
- );
- Util::cacheSet('dbs_to_test', $GLOBALS['dbs_to_test']);
- Util::cacheSet('proc_priv', $GLOBALS['proc_priv']);
- Util::cacheSet('table_priv', $GLOBALS['table_priv']);
- Util::cacheSet('col_priv', $GLOBALS['col_priv']);
- Util::cacheSet('db_priv', $GLOBALS['db_priv']);
- } // end function
- }
|