sp-security.test 12 KB
Newer Older
1 2 3 4
#
# Testing SQL SECURITY of stored procedures
#

5 6 7
# Can't test with embedded server that doesn't support grants
-- source include/not_embedded.inc

8 9 10 11 12
connect (con1root,localhost,root,,);

connection con1root;
use test;

13 14 15
# Create user user1 with no particular access rights
grant usage on *.* to user1@localhost;
flush privileges;
16 17

--disable_warnings
18
drop table if exists t1;
19 20 21 22 23
drop database if exists db1_secret;
--enable_warnings
# Create our secret database
create database db1_secret;

24 25 26 27
# Can create a procedure in other db
create procedure db1_secret.dummy() begin end;
drop procedure db1_secret.dummy;

28 29 30 31
use db1_secret;

create table t1 ( u varchar(64), i int );

32
# A test procedure and function
33 34
create procedure stamp(i int)
  insert into db1_secret.t1 values (user(), i);
35
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
36 37
show procedure status like 'stamp';

38 39 40 41
create function db() returns varchar(64) return database();
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

42 43 44
# root can, of course
call stamp(1);
select * from t1;
45
select db();
46

47 48 49 50
grant execute on procedure db1_secret.stamp to user1@'%';
grant execute on function db1_secret.db to user1@'%';
grant execute on procedure db1_secret.stamp to ''@'%';
grant execute on function db1_secret.db to ''@'%';
51

52
connect (con2user1,localhost,user1,,);
53 54
connect (con3anon,localhost,anon,,);

55

56
#
57
# User1 can
58
#
59
connection con2user1;
60 61

# This should work...
62
call db1_secret.stamp(2);
63
select db1_secret.db();
64 65

# ...but not this
66
--error 1142
67 68
select * from db1_secret.t1;

69
# ...and not this
unknown's avatar
unknown committed
70
--error 1044
71
create procedure db1_secret.dummy() begin end;
72
--error 1305
73 74 75
drop procedure db1_secret.dummy;


76 77 78 79 80 81
#
# Anonymous can
#
connection con3anon;

# This should work...
82
call db1_secret.stamp(3);
83
select db1_secret.db();
84 85

# ...but not this
86
--error 1142
87 88
select * from db1_secret.t1;

89
# ...and not this
unknown's avatar
unknown committed
90
--error 1044
91
create procedure db1_secret.dummy() begin end;
92
--error 1305
93 94 95
drop procedure db1_secret.dummy;


96 97 98 99 100 101 102 103 104 105
#
# Check it out
#
connection con1root;
select * from t1;

#
# Change to invoker's rights
#
alter procedure stamp sql security invoker;
106
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
107 108
show procedure status like 'stamp';

109 110 111 112
alter function db sql security invoker;
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

113 114 115
# root still can
call stamp(4);
select * from t1;
116
select db();
117 118

#
119
# User1 cannot
120
#
121
connection con2user1;
122 123 124

# This should not work
--error 1044
125
call db1_secret.stamp(5);
126 127
--error 1044
select db1_secret.db();
128 129 130 131 132 133 134 135

#
# Anonymous cannot
#
connection con3anon;

# This should not work
--error 1044
136
call db1_secret.stamp(6);
137 138
--error 1044
select db1_secret.db();
139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157

#
# BUG#2777
#

connection con1root;
--disable_warnings
drop database if exists db2;
--enable_warnings
create database db2;

use db2;

create table t2 (s1 int);
insert into t2 values (0);

grant usage on db2.* to user1@localhost;
grant select on db2.* to user1@localhost;
grant usage on db2.* to user2@localhost;
158 159
grant select,insert,update,delete,create routine on db2.* to user2@localhost;
grant create routine on db2.* to user1@localhost;
160 161 162 163 164 165 166 167
flush privileges;

connection con2user1;
use db2;

create procedure p () insert into t2 values (1);

# Check that this doesn't work.
168
--error 1142
169 170 171 172 173 174 175 176
call p();

connect (con4user2,localhost,user2,,);

connection con4user2;
use db2;

# This should not work, since p is executed with definer's (user1's) rights.
177
--error 1370
178 179 180 181 182 183 184 185
call p();
select * from t2;

create procedure q () insert into t2 values (2);

call q();
select * from t2;

186
connection con1root;
187
grant usage on procedure db2.q to user2@localhost with grant option;
188 189

connection con4user2;
190
grant execute on procedure db2.q to user1@localhost;
191

192 193 194 195 196 197 198
connection con2user1;
use db2;

# This should work
call q();
select * from t2;

199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214
#
# BUG#6030: Stored procedure has no appropriate DROP privilege
# (or ALTER for that matter)

# still connection con2user1 in db2

# This should work:
alter procedure p modifies sql data;
drop procedure p;

# This should NOT work
--error 1370
alter procedure q modifies sql data;
--error 1370
drop procedure q;

215
connection con1root;
216 217 218 219 220 221 222 223
use db2;
# But root always can
alter procedure q modifies sql data;
drop procedure q;


# Clean up
#Still connection con1root;
224 225 226
disconnect con2user1;
disconnect con3anon;
disconnect con4user2;
227
use test;
228
select type,db,name from mysql.proc;
229
drop database db1_secret;
230
drop database db2;
231 232 233
# Make sure the routines are gone
select type,db,name from mysql.proc;
# Get rid of the users
234
delete from mysql.user where user='user1' or user='user2';
235
delete from mysql.user where user='' and host='%';
236 237
# And any routine privileges
delete from mysql.procs_priv where user='user1' or user='user2';
238 239 240 241
# Delete the grants to user ''@'%' that was created above
delete from mysql.procs_priv where user='' and host='%';
delete from mysql.db where user='user2';
flush privileges;
242 243 244 245 246 247 248 249 250 251
#
# Test the new security acls
#
grant usage on *.* to usera@localhost;
grant usage on *.* to userb@localhost;
grant usage on *.* to userc@localhost;
create database sptest;
create table t1 ( u varchar(64), i int );
create procedure sptest.p1(i int) insert into test.t1 values (user(), i);
grant insert on t1 to usera@localhost;
252
grant execute on procedure sptest.p1 to usera@localhost;
253
show grants for usera@localhost;
254
grant execute on procedure sptest.p1 to userc@localhost with grant option;
255 256 257 258 259 260 261 262 263
show grants for userc@localhost;

connect (con2usera,localhost,usera,,);
connect (con3userb,localhost,userb,,);
connect (con4userc,localhost,userc,,);

connection con2usera;
call sptest.p1(1);
--error 1370
264
grant execute on procedure sptest.p1 to userb@localhost;
265 266 267 268 269 270 271
--error 1370
drop procedure sptest.p1;

connection con3userb;
--error 1370
call sptest.p1(2);
--error 1370
272
grant execute on procedure sptest.p1 to userb@localhost;
273 274 275 276 277
--error 1370
drop procedure sptest.p1;

connection con4userc;
call sptest.p1(3);
278
grant execute on procedure sptest.p1 to userb@localhost;
279 280 281 282 283 284
--error 1370
drop procedure sptest.p1;

connection con3userb;
call sptest.p1(4);
--error 1370
285
grant execute on procedure sptest.p1 to userb@localhost;
286 287 288 289 290 291
--error 1370
drop procedure sptest.p1;

connection con1root;
select * from t1;

292
grant all privileges on procedure sptest.p1 to userc@localhost;
293 294 295 296
show grants for userc@localhost;
show grants for userb@localhost;

connection con4userc;
297
revoke all privileges on procedure sptest.p1 from userb@localhost;
298 299 300 301 302 303 304 305 306 307 308 309

connection con1root;
show grants for userb@localhost;

#cleanup
disconnect con4userc;
disconnect con3userb;
disconnect con2usera;
use test;
drop database sptest;
delete from mysql.user where user='usera' or user='userb' or user='userc';
delete from mysql.procs_priv where user='usera' or user='userb' or user='userc';
310 311 312
delete from mysql.tables_priv where user='usera';
flush privileges;
drop table t1;
313

314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344
#
# BUG#9503: reseting correct parameters of thread after error in SP function
#
connect (root,localhost,root,,test);
connection root;

--disable_warnings
drop function if exists bug_9503;
--enable_warnings
delimiter //;
create database mysqltest//
use mysqltest//
create table t1 (s1 int)//
grant select on t1 to user1@localhost//
create function bug_9503 () returns int sql security invoker begin declare v int;
select min(s1) into v from t1; return v; end//
delimiter ;//

connect (user1,localhost,user1,,test);
connection user1;
use mysqltest;
-- error 1370
select bug_9503();

connection root;
grant execute on function bug_9503 to user1@localhost;

connection user1;
do 1;
use test;

unknown's avatar
unknown committed
345
disconnect user1;
346 347 348 349 350
connection root;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop function bug_9503;
use test;
drop database mysqltest;
351

352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
#
# correct value from current_user() in function run from "security definer"
# (BUG#7291)
#
connection con1root;
use test;

select current_user();
select user();
create procedure bug7291_0 () sql security invoker select current_user(), user();
create procedure bug7291_1 () sql security definer call bug7291_0();
create procedure bug7291_2 () sql security invoker call bug7291_0();
grant execute on procedure bug7291_0 to user1@localhost;
grant execute on procedure bug7291_1 to user1@localhost;
grant execute on procedure bug7291_2 to user1@localhost;

connect (user1,localhost,user1,,);
connection user1;

call bug7291_2();
call bug7291_1();

connection con1root;
drop procedure bug7291_1;
drop procedure bug7291_2;
drop procedure bug7291_0;
disconnect user1;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop user user1@localhost;
381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406

#
# Bug #12318: Wrong error message when accessing an inaccessible stored
# procedure in another database when the current database is
# information_schema.
# 

--disable_warnings
drop database if exists mysqltest_1;
--enable_warnings

create database mysqltest_1;
delimiter //;
create procedure mysqltest_1.p1()
begin
   select 1 from dual;
end//
delimiter ;//

grant usage on *.* to mysqltest_1@localhost;

connect (n1,localhost,mysqltest_1,,information_schema,$MASTER_MYPORT,$MASTER_MYSOCK);
connection n1;
--error 1370
call mysqltest_1.p1();
disconnect n1;
407 408 409 410 411 412
# Test also without a current database
connect (n2,localhost,mysqltest_1,,*NO-ONE*,$MASTER_MYPORT,$MASTER_MYSOCK);
connection n2;
--error 1370
call mysqltest_1.p1();
disconnect n2;
413 414 415 416 417 418 419 420 421

connection default;

drop procedure mysqltest_1.p1;
drop database mysqltest_1;

revoke usage on *.* from mysqltest_1@localhost;
drop user mysqltest_1@localhost;

422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445
#
# BUG#12812 create view calling a function works without execute right
#           on function
delimiter |;
--disable_warnings
drop function if exists bug12812|
--enable_warnings
create function bug12812() returns char(2)
begin
  return 'ok';
end;
create user user_bug12812@localhost IDENTIFIED BY 'ABC'|
--replace_result $MASTER_MYPORT MYSQL_PORT $MASTER_MYSOCK MYSQL_SOCK
connect (test_user_12812,localhost,user_bug12812,ABC,test)|
--error 1370
SELECT test.bug12812()|
--error 1370
CREATE VIEW v1 AS SELECT test.bug12812()|
# Cleanup
connection default|
disconnect test_user_12812|
DROP USER user_bug12812@localhost|
drop function bug12812|
delimiter ;|
446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489


#
# BUG#14834: Server denies to execute Stored Procedure
#
# The problem here was with '_' in the database name.
#
create database db_bug14834;

create user user1_bug14834@localhost identified by '';
# The exact name of the database (no wildcard)
grant all on `db\_bug14834`.* to user1_bug14834@localhost;

create user user2_bug14834@localhost identified by '';
# The exact name of the database (no wildcard)
grant all on `db\_bug14834`.* to user2_bug14834@localhost;

create user user3_bug14834@localhost identified by '';
# Wildcards in the database name
grant all on `db__ug14834`.* to user3_bug14834@localhost;

connect (user1_bug14834,localhost,user1_bug14834,,db_bug14834);
# Create the procedure and check that we can call it
create procedure p_bug14834() select user(), current_user();
call p_bug14834();

connect (user2_bug14834,localhost,user2_bug14834,,db_bug14834);
# This didn't work before
call p_bug14834();

connect (user3_bug14834,localhost,user3_bug14834,,db_bug14834);
# Should also work
call p_bug14834();

# Cleanup
connection default;
disconnect user1_bug14834;
disconnect user2_bug14834;
disconnect user3_bug14834;
drop user user1_bug14834@localhost;
drop user user2_bug14834@localhost;
drop user user3_bug14834@localhost;
drop database db_bug14834;

490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527

#
# BUG#14533: 'desc tbl' in stored procedure causes error 1142
#
create database db_bug14533;
use db_bug14533;
create table t1 (id int);
create user user_bug14533@localhost identified by '';

create procedure bug14533_1()
    sql security definer
  desc db_bug14533.t1;

create procedure bug14533_2()
    sql security definer
   select * from db_bug14533.t1;

grant execute on procedure db_bug14533.bug14533_1 to user_bug14533@localhost;
grant execute on procedure db_bug14533.bug14533_2 to user_bug14533@localhost;

connect (user_bug14533,localhost,user_bug14533,,test);

# These should work
call db_bug14533.bug14533_1();
call db_bug14533.bug14533_2();

# For reference, these should not work
--error ER_TABLEACCESS_DENIED_ERROR
desc db_bug14533.t1;
--error ER_TABLEACCESS_DENIED_ERROR
select * from db_bug14533.t1;

# Cleanup
connection default;
disconnect user_bug14533;
drop user user_bug14533@localhost;
drop database db_bug14533;

528
# End of 5.0 bugs.