<?php
include_once $_SERVER['DOCUMENT_ROOT'] . '/include/shared-manual.inc';
$TOC = array();
$TOC_DEPRECATED = array();
$PARENTS = array();
include_once dirname(__FILE__) ."/toc/mongodb.security.inc";
$setup = array (
  'home' => 
  array (
    0 => 'index.php',
    1 => 'PHP Manual',
  ),
  'head' => 
  array (
    0 => 'UTF-8',
    1 => 'pt_BR',
  ),
  'this' => 
  array (
    0 => 'mongodb.security.script_injection.php',
    1 => 'Ataques de inje&ccedil;&atilde;o de script',
    2 => 'Ataques de inje&ccedil;&atilde;o de script',
  ),
  'up' => 
  array (
    0 => 'mongodb.security.php',
    1 => 'Seguran&ccedil;a',
  ),
  'prev' => 
  array (
    0 => 'mongodb.security.request_injection.php',
    1 => 'Ataques de Inje&ccedil;&atilde;o de Requisi&ccedil;&atilde;o',
  ),
  'next' => 
  array (
    0 => 'mongodb.mongodb.php',
    1 => 'MongoDB\\Driver',
  ),
  'alternatives' => 
  array (
  ),
  'source' => 
  array (
    'lang' => 'pt_BR',
    'path' => 'reference/mongodb/security.xml',
  ),
  'history' => 
  array (
  ),
);
$setup["toc"] = $TOC;
$setup["toc_deprecated"] = $TOC_DEPRECATED;
$setup["parents"] = $PARENTS;
manual_setup($setup);

contributors($setup);

?>
<div id="mongodb.security.script_injection" class="section">
  <h2 class="title">Ataques de injeção de script</h2>
  <p class="para">
   Se você estiver usando JavaScript, certifique-se de que quaisquer variáveis que cruzem o limite
   PHP para JavaScript sejam passadas no campo <code class="literal">scope</code> do
   <span class="classname"><a href="class.mongodb-bson-javascript.php" class="classname">MongoDB\BSON\Javascript</a></span>, e não interpoladas em
   string JavaScript. Isso pode surgir ao usar cláusulas <code class="literal">$where</code>
   em consultas, mapReduce e comandos de grupo, e em qualquer outro momento em que você
   passar JavaScript para o banco de dados.
  </p>
  <p class="para">
   Por exemplo, suponha que temos algum JavaScript para cumprimentar um usuário nos logs do banco
   de dados. Nós poderíamos fazer:
  </p>
  <div class="example-contents">
<div class="phpcode"><code><span style="color: #000000"><span style="color: #0000BB">&lt;?php<br />$m </span><span style="color: #007700">= new </span><span style="color: #0000BB">MongoDB\Driver\Manager</span><span style="color: #007700">;<br /><br /></span><span style="color: #FF8000">// Não faça isso!!!<br /></span><span style="color: #0000BB">$username </span><span style="color: #007700">= </span><span style="color: #0000BB">$_GET</span><span style="color: #007700">[</span><span style="color: #DD0000">'field'</span><span style="color: #007700">];<br /><br /></span><span style="color: #0000BB">$cmd </span><span style="color: #007700">= new </span><span style="color: #0000BB">\MongoDB\Driver\Command</span><span style="color: #007700">( [<br />    </span><span style="color: #DD0000">'eval' </span><span style="color: #007700">=&gt; </span><span style="color: #DD0000">"print('Olá, </span><span style="color: #0000BB">$username</span><span style="color: #DD0000">!');"<br /></span><span style="color: #007700">] );<br /><br /></span><span style="color: #0000BB">$r </span><span style="color: #007700">= </span><span style="color: #0000BB">$m</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">executeCommand</span><span style="color: #007700">( </span><span style="color: #DD0000">'dramio'</span><span style="color: #007700">, </span><span style="color: #0000BB">$cmd </span><span style="color: #007700">);<br /></span><span style="color: #0000BB">?&gt;</span></span></code></div>
  </div>

  <p class="para">
   No entanto, e se um usuário mal intencionado passar algum JavaScript?
  </p>
  <div class="example-contents">
<div class="phpcode"><code><span style="color: #000000"><span style="color: #0000BB">&lt;?php<br />$m </span><span style="color: #007700">= new </span><span style="color: #0000BB">MongoDB\Driver\Manager</span><span style="color: #007700">;<br /><br /></span><span style="color: #FF8000">// Não faça isso!!!<br /></span><span style="color: #0000BB">$username </span><span style="color: #007700">= </span><span style="color: #0000BB">$_GET</span><span style="color: #007700">[</span><span style="color: #DD0000">'field'</span><span style="color: #007700">];<br /></span><span style="color: #FF8000">// $username é definido como "'); db.users.drop(); print('"<br /><br /></span><span style="color: #0000BB">$cmd </span><span style="color: #007700">= new </span><span style="color: #0000BB">\MongoDB\Driver\Command</span><span style="color: #007700">( [<br />    </span><span style="color: #DD0000">'eval' </span><span style="color: #007700">=&gt; </span><span style="color: #DD0000">"print('Olá, </span><span style="color: #0000BB">$username</span><span style="color: #DD0000">!');"<br /></span><span style="color: #007700">] );<br /><br /></span><span style="color: #0000BB">$r </span><span style="color: #007700">= </span><span style="color: #0000BB">$m</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">executeCommand</span><span style="color: #007700">( </span><span style="color: #DD0000">'dramio'</span><span style="color: #007700">, </span><span style="color: #0000BB">$cmd </span><span style="color: #007700">);<br /></span><span style="color: #0000BB">?&gt;</span></span></code></div>
  </div>

  <p class="para">
   Agora o MongoDB executa a string JavaScript
   <code class="literal">&quot;print(&#039;Olá, &#039;); db.users.drop(); print(&#039;!&#039;);&quot;</code>.
   Este ataque é fácil de evitar: use <code class="literal">args</code> para passar
   variáveis de PHP para JavaScript:
  </p>
  <div class="example-contents">
<div class="phpcode"><code><span style="color: #000000"><span style="color: #0000BB">&lt;?php<br />$m </span><span style="color: #007700">= new </span><span style="color: #0000BB">MongoDB\Driver\Manager</span><span style="color: #007700">;<br /><br /></span><span style="color: #0000BB">$_GET</span><span style="color: #007700">[</span><span style="color: #DD0000">'field'</span><span style="color: #007700">] = </span><span style="color: #DD0000">'derick'</span><span style="color: #007700">;<br /></span><span style="color: #0000BB">$args </span><span style="color: #007700">= [ </span><span style="color: #0000BB">$_GET</span><span style="color: #007700">[</span><span style="color: #DD0000">'field'</span><span style="color: #007700">] ];<br /><br /></span><span style="color: #0000BB">$cmd </span><span style="color: #007700">= new </span><span style="color: #0000BB">\MongoDB\Driver\Command</span><span style="color: #007700">( [<br />    </span><span style="color: #DD0000">'eval' </span><span style="color: #007700">=&gt; </span><span style="color: #DD0000">"function greet(username) { print('Olá, ' + username + '!'); }"</span><span style="color: #007700">,<br />    </span><span style="color: #DD0000">'args' </span><span style="color: #007700">=&gt; </span><span style="color: #0000BB">$args</span><span style="color: #007700">,<br />] );<br /><br /></span><span style="color: #0000BB">$r </span><span style="color: #007700">= </span><span style="color: #0000BB">$m</span><span style="color: #007700">-&gt;</span><span style="color: #0000BB">executeCommand</span><span style="color: #007700">( </span><span style="color: #DD0000">'dramio'</span><span style="color: #007700">, </span><span style="color: #0000BB">$cmd </span><span style="color: #007700">);<br /></span><span style="color: #0000BB">?&gt;</span></span></code></div>
  </div>

  <p class="para">
   Isto adiciona um argumento ao escopo JavaScript, que é usado como argumento
   para a função <code class="literal">greet</code>. Agora, se
   alguém tentar enviar código malicioso, o MongoDB imprimirá inofensivamente
   <code class="literal">Olá, &#039;); db.dropDatabase(); print(&#039;!</code>.
  </p>

  <p class="para">
   O uso de argumentos ajuda a evitar que entradas maliciosas sejam executadas pelo
   banco de dados. Porém, você deve garantir que seu código não vire
   e execute a entrada de qualquer maneira! Em primeiro lugar, é melhor evitar executar
   <em>qualquer</em> JavaScript no servidor.
  </p>

  <p class="para">
   É altamente recomendável evitar a <a href="https://www.mongodb.com/docs/manual/reference/operator/query/where/#considerations" class="link external">&raquo;&nbsp;cláusula
   $where</a> nas consultas, pois ela afeta significativamente o desempenho. Sempre
   que possível, use operadores de consulta normais ou o <a href="https://www.mongodb.com/docs/manual/core/aggregation-pipeline" class="link external">&raquo;&nbsp;Estrutura de
   agregação</a>.
  </p>

  <p class="para">
   Como alternativa ao <a href="https://www.mongodb.com/docs/manual/core/map-reduce/" class="link external">&raquo;&nbsp;MapReduce</a>, que usa
   JavaScript, considere usar o <a href="https://www.mongodb.com/docs/manual/core/aggregation-pipeline" class="link external">&raquo;&nbsp;Estrutura de
   agregação</a>. Ao contrário do Map/Reduce, ele usa uma linguagem idiomática para
   construir consultas, sem ter que escrever e usar a abordagem JavaScript mais lenta
   que o Map/Reduce requer.
  </p>

  <p class="para">
   O <a href="https://www.mongodb.com/docs/manual/reference/command/eval/" class="link external">&raquo;&nbsp;comando eval</a>
   foi descontinuado desde o MongoDB 3.0 e também deve ser evitado.
  </p>
 </div><?php manual_footer($setup); ?>