Skip to content

kijin/mysquirrel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

61 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Introduction

MySquirrel is a lightweight object-oriented wrapper around the MySQL extension of PHP 5. The focus is on simplicity and ease of use, robust error handling, and most of all, security.

MySquirrel is designed with the small-time web developer in mind, whose projects often end up in the unpredictable and inconsistent world of shared hosting. MySquirrel does not require PHP extensions such as MySQLi and PDO (which some hosts still don't support), while bringing to you some of the major benefits of those newer interfaces. The only prerequisites are PHP 5.1+ and a reasonably up-to-date version of MySQL.

MySquirrel makes it super easy to run parametrized queries and prepared statements, and otherwise mimics PDO's behavior, while requiring nothing more than good old mysql_* functions. MySquirrel can also be used in paranoid mode, which will try to prevent you from writing potentially insecure queries. All variables marked with ? and passed as separate parameters are automatically escaped. No more tedious escaping, no more SQL injection vulnerabilities.

Note: The MySQL extension will be deprecated in PHP 5.5 and later. If you started using MySquirrel in an old project but your web host now supports MySQLi and/or PDO, you'd better update your code to use a better alternative!

MySquirrel is released under the GNU Lesser General Public License, version 3.

What's wrong with mysql_query?

Good old mysql_* functions are among the most commonly used in PHP web development, but they are rather difficult to protect against SQL injection attacks. Injection-proofing often involves tedious escaping, and PHP supplies no less than three functions with convoluted names for this purpose: addslashes (deprecated), mysql_escape_string (also deprecated), and mysql_real_escape_string (recommended). You are supposed to apply this function to each and every variable that you use in your query, all the while accounting for the quirks introduced by abominations such as magic quotes. However, a single unescaped parameter is all it takes for a remote attacker to pwn your database: ' OR 1 = 1; DELETE FROM table; --. No wonder everyone wants you to stay far away from mysql_* functions.

More modern extensions, such as PDO and MySQLi, enable prepared statements and/or parametrized queries that can greatly reduce injection vulnerabilities. But they are not always available with shared hosting where PHP programs are most often deployed, not to mention that the powerful API (especially MySQLi) makes common tasks much more complicated than usual. Try to run a parametrized query using MySQLi with half a dozen bound variables! It is just as tedious, if not more, to use MySQLi properly as it is to use MySQL properly. As a result, PHP developers often hang on to the nearly deprecated mysql_* functions.

MySquirrel comes to the rescue. Just see how easy it is, below:

Quick start guide

Just include one file.

include('mysquirrel.php');

Instead of mysql_connect(), call new MySquirrel() to create a connection object.

$mysql = new MySquirrel('localhost', 'user', 'pass', 'database');
$mysql->paranoid();

Mark variables with a placeholder, and supply the values separately.

$result = $mysql->query('SELECT * FROM users WHERE id = ?', $id);
while ($row = $result->fetch()) {
    echo $row['name'];
}

The result class implements the Iterator interface, so you can also do this.

$result = $mysql->query('SELECT * FROM users WHERE id = ?', $id);
foreach ($result as $row) {
    echo $row['name'];
}

Supply any number of additional variables as extra arguments.

$mysql->query('UPDATE users SET email = ? WHERE id = ?', $email, $id);
$ar = $mysql->affectedRows();

Alternatively, you can pass an array of parameters. This can be useful sometimes.

$params = array($name, $password, $email);
$mysql->query('INSERT INTO users (name, password, email) VALUES (?, ?, ?)', $params);
$id = $mysql->lastInsertID();

Use prepared statements to speed up identical queries.

$stmt = $mysql->prepare('INSERT INTO users (name, password, email) VALUES (?, ?, ?)');
$stmt->execute($name1, $password1, $email1);
$stmt->execute($name2, $password2, $email2);
$stmt->execute($name3, $password3, $email3);

Differences from PDO

The following points are not intended to suggest that MySquirrel is better than PDO. In fact, if PDO is available, you should probably use it instead of "hacks" such as MySquirrel.

  • Parameters can be passed as separate arguments or as an array. (PDO supports only the latter.)
  • Errors always generate an exception. (PDO can be configured to produce warnings instead.)
  • MySquirrel only supports MySQL. (PDO supports almost a dozen different database systems.)
  • MySquirrel has "paranoid mode". (PDO doesn't, but you should write secure programs anyway.)

Reference Guide

Any error condition reported by the server will result in a MySquirrelException (or one of its subclasses) being thrown.

MySquirrel class

  • __construct($host, $user, $pass, $database, [$charset] )
  • paranoid() Activates paranoid mode (see below)
  • prepare($querystring)
  • query($querystring, [$param1, $param2 ... ] )
  • rawQuery($querystring)
  • affectedRows()
  • lastInsertID()
  • beginTransaction() Only with InnoDB
  • commit() Only with InnoDB
  • rollback() Only with InnoDB

MySquirrelPreparedStmt class

These methods should be called on the return value of prepare().

  • execute( [$param1, $param2 ... ] )

MySquirrelResult class

These methods should be called on the return value of query(), rawQuery(), or execute().

  • fetch() Fetch a row as both types of arrays
  • fetchAssoc() Fetch a row as an associative array
  • fetchObject($class, $params) Fetch a row as an object, optionally of a specified class
  • fetchRow() Fetch a row as an enumerated array
  • fetchAll() Returns every row in the result set
  • fieldInfo($offset) Returns information about a column
  • numFields() Returns number of columns in the result set
  • numRows() Returns number of rows in the result set

Notes on Best Practice

Never, ever put variables into the querystring, e.g. WHERE id = $id AND name = '$name'. Script kiddies and other criminals love you for mixing variables with SQL! Instead, put a question mark (?) where you would normally put a variable. Do not put quotes around it. Just pretend that the question mark is part of the SQL syntax. Then supply the variable itself as an additional parameter when you call query(), as in the examples above.

You can supply as many parameters as you want in this way, but the number of parameters must match the number of placeholders. The same rule applies when you pass variables as a single array. MySquirrel will automatically escape all parameters supplied using this syntax, so there is no need to pre-escape them in any way.

One Statement at a Time

Notice that query() will not accept querystrings that contain multiple SQL statements. Only one statement is permitted per method call. This helps prevent malicious folks from attaching DELETE or similar to your querystring.

A somewhat inconvenient side effect of this rule is that you cannot run queries that contain semicolons. You cannot even have semicolons inside string literals. String literals containing semicolons should be passed as separate parameters instead. In practice, most string literals come from insecure sources, so it is often a good idea to pass them as separate parameters anyway. Paranoid mode, explained below, actually makes this practice mandatory.

Another side effect is that you cannot run multiple statements at the same time. Nor is it possible to run statements that contain other statements, such as many forms of CREATE PROCEDURE. If you need to execute several statements at the same time, or if you need to run statements that contain other statements, use rawQuery() instead. This might be useful, for example, when creating the tables and indexes for the first time in an install script. Note, however, that rawQuery() gives you dangerous power unless you are absolutely sure what you're doing. In paranoid mode, rawQuery() cannot be used.

Prepared Statements

Prepared queries are executed in two steps. First, you call the prepare() method on the connection object to create a prepared statement on the server. (This requires MySQL 4.1 or higher.) If the querystring is syntactically correct, the method will return an object on which you can call execute() as many times as you want -- with or without parameters. This improves performance when running the same query over and over again.

Paranoid Mode

Paranoid mode, which can be activated by calling paranoid() on the connection object, makes two changes to MySquirrel's behavior:

  • It disables rawQuery().
  • It makes query() reject querystrings that contain quotes, comments, or null bytes.

Note that these restrictions will also prevent you from using any string literal at all, such as SELECT * FROM tickets WHERE status = 'pending' ... among others. Although string literals are not necessarily insecure, in practice, a lot of these originate from untrusted sources and result in vulnerabilities. Likewise, comments and null bytes in short queries are a common sign of injection attacks.

Paranoid mode is intended to be a debugging device, whose purpose is to help you identify potentially insecure queries. Paranoid mode is not perfectly secure, and cannot be, since it uses blacklisting instead of whitelisting. This shortcoming is by design; the purpose is to flag and disable only the most obvious attack vectors. The additional security offered by paranoid mode should not be relied upon as the sole barrier against injection attacks.

For compatibility reasons, paranoid mode is not activated by default. To activate, call paranoid() immediately after obtaining the connection object.

Error Handling

Unlike mysql_* functions, MySquirrel will not allow errors to pass silently. Nor will it follow the dickheaded practice of just die()ing on any database error. If any error occurs, an exception will be thrown. If you don't catch it, your script will halt right there. It is your responsibility to catch and handle this exception properly. Often, mysql_* doesn't even issue a warning when you try to execute SQL statements with syntax erorrs! This recklessness must come to an end, and MySquirrel goes to great lengths to remedy the situation where possible.

About

Secure PHP & MySQL for those who don't have PDO

Resources

License

LGPL-3.0, GPL-3.0 licenses found

Licenses found

LGPL-3.0
COPYING.lesser
GPL-3.0
COPYING

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages