sp-security.test 16.3 KB
Newer Older
1 2 3 4
#
# Testing SQL SECURITY of stored procedures
#

5 6 7
# Can't test with embedded server that doesn't support grants
-- source include/not_embedded.inc

8 9 10 11 12
connect (con1root,localhost,root,,);

connection con1root;
use test;

13 14 15
# Create user user1 with no particular access rights
grant usage on *.* to user1@localhost;
flush privileges;
16 17

--disable_warnings
18
drop table if exists t1;
19 20 21 22 23
drop database if exists db1_secret;
--enable_warnings
# Create our secret database
create database db1_secret;

24 25 26 27
# Can create a procedure in other db
create procedure db1_secret.dummy() begin end;
drop procedure db1_secret.dummy;

28 29 30 31
use db1_secret;

create table t1 ( u varchar(64), i int );

32
# A test procedure and function
33 34
create procedure stamp(i int)
  insert into db1_secret.t1 values (user(), i);
35
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
36 37
show procedure status like 'stamp';

38 39 40 41
create function db() returns varchar(64) return database();
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

42 43 44
# root can, of course
call stamp(1);
select * from t1;
45
select db();
46

47 48 49 50
grant execute on procedure db1_secret.stamp to user1@'%';
grant execute on function db1_secret.db to user1@'%';
grant execute on procedure db1_secret.stamp to ''@'%';
grant execute on function db1_secret.db to ''@'%';
51

52
connect (con2user1,localhost,user1,,);
53 54
connect (con3anon,localhost,anon,,);

55

56
#
57
# User1 can
58
#
59
connection con2user1;
60 61

# This should work...
62
call db1_secret.stamp(2);
63
select db1_secret.db();
64 65

# ...but not this
66
--error 1142
67 68
select * from db1_secret.t1;

69
# ...and not this
unknown's avatar
unknown committed
70
--error 1044
71
create procedure db1_secret.dummy() begin end;
72
--error 1305
73 74 75
drop procedure db1_secret.dummy;


76 77 78 79 80 81
#
# Anonymous can
#
connection con3anon;

# This should work...
82
call db1_secret.stamp(3);
83
select db1_secret.db();
84 85

# ...but not this
86
--error 1142
87 88
select * from db1_secret.t1;

89
# ...and not this
unknown's avatar
unknown committed
90
--error 1044
91
create procedure db1_secret.dummy() begin end;
92
--error 1305
93 94 95
drop procedure db1_secret.dummy;


96 97 98 99 100 101 102 103 104 105
#
# Check it out
#
connection con1root;
select * from t1;

#
# Change to invoker's rights
#
alter procedure stamp sql security invoker;
106
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
107 108
show procedure status like 'stamp';

109 110 111 112
alter function db sql security invoker;
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

113 114 115
# root still can
call stamp(4);
select * from t1;
116
select db();
117 118

#
119
# User1 cannot
120
#
121
connection con2user1;
122 123 124

# This should not work
--error 1044
125
call db1_secret.stamp(5);
126 127
--error 1044
select db1_secret.db();
128 129 130 131 132 133 134 135

#
# Anonymous cannot
#
connection con3anon;

# This should not work
--error 1044
136
call db1_secret.stamp(6);
137 138
--error 1044
select db1_secret.db();
139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157

#
# BUG#2777
#

connection con1root;
--disable_warnings
drop database if exists db2;
--enable_warnings
create database db2;

use db2;

create table t2 (s1 int);
insert into t2 values (0);

grant usage on db2.* to user1@localhost;
grant select on db2.* to user1@localhost;
grant usage on db2.* to user2@localhost;
158 159
grant select,insert,update,delete,create routine on db2.* to user2@localhost;
grant create routine on db2.* to user1@localhost;
160 161 162 163 164 165 166 167
flush privileges;

connection con2user1;
use db2;

create procedure p () insert into t2 values (1);

# Check that this doesn't work.
168
--error 1142
169 170 171 172 173 174 175 176
call p();

connect (con4user2,localhost,user2,,);

connection con4user2;
use db2;

# This should not work, since p is executed with definer's (user1's) rights.
177
--error 1370
178 179 180 181 182 183 184 185
call p();
select * from t2;

create procedure q () insert into t2 values (2);

call q();
select * from t2;

186
connection con1root;
187
grant usage on procedure db2.q to user2@localhost with grant option;
188 189

connection con4user2;
190
grant execute on procedure db2.q to user1@localhost;
191

192 193 194 195 196 197 198
connection con2user1;
use db2;

# This should work
call q();
select * from t2;

199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214
#
# BUG#6030: Stored procedure has no appropriate DROP privilege
# (or ALTER for that matter)

# still connection con2user1 in db2

# This should work:
alter procedure p modifies sql data;
drop procedure p;

# This should NOT work
--error 1370
alter procedure q modifies sql data;
--error 1370
drop procedure q;

215
connection con1root;
216 217 218 219 220 221 222 223
use db2;
# But root always can
alter procedure q modifies sql data;
drop procedure q;


# Clean up
#Still connection con1root;
224 225 226
disconnect con2user1;
disconnect con3anon;
disconnect con4user2;
227
use test;
228
select type,db,name from mysql.proc;
229
drop database db1_secret;
230
drop database db2;
231 232 233
# Make sure the routines are gone
select type,db,name from mysql.proc;
# Get rid of the users
234
delete from mysql.user where user='user1' or user='user2';
235
delete from mysql.user where user='' and host='%';
236 237
# And any routine privileges
delete from mysql.procs_priv where user='user1' or user='user2';
238 239 240 241
# Delete the grants to user ''@'%' that was created above
delete from mysql.procs_priv where user='' and host='%';
delete from mysql.db where user='user2';
flush privileges;
242 243 244 245 246 247 248 249 250 251
#
# Test the new security acls
#
grant usage on *.* to usera@localhost;
grant usage on *.* to userb@localhost;
grant usage on *.* to userc@localhost;
create database sptest;
create table t1 ( u varchar(64), i int );
create procedure sptest.p1(i int) insert into test.t1 values (user(), i);
grant insert on t1 to usera@localhost;
252
grant execute on procedure sptest.p1 to usera@localhost;
253
show grants for usera@localhost;
254
grant execute on procedure sptest.p1 to userc@localhost with grant option;
255 256 257 258 259 260 261 262 263
show grants for userc@localhost;

connect (con2usera,localhost,usera,,);
connect (con3userb,localhost,userb,,);
connect (con4userc,localhost,userc,,);

connection con2usera;
call sptest.p1(1);
--error 1370
264
grant execute on procedure sptest.p1 to userb@localhost;
265 266 267 268 269 270 271
--error 1370
drop procedure sptest.p1;

connection con3userb;
--error 1370
call sptest.p1(2);
--error 1370
272
grant execute on procedure sptest.p1 to userb@localhost;
273 274 275 276 277
--error 1370
drop procedure sptest.p1;

connection con4userc;
call sptest.p1(3);
278
grant execute on procedure sptest.p1 to userb@localhost;
279 280 281 282 283 284
--error 1370
drop procedure sptest.p1;

connection con3userb;
call sptest.p1(4);
--error 1370
285
grant execute on procedure sptest.p1 to userb@localhost;
286 287 288 289 290 291
--error 1370
drop procedure sptest.p1;

connection con1root;
select * from t1;

292
grant all privileges on procedure sptest.p1 to userc@localhost;
293 294 295 296
show grants for userc@localhost;
show grants for userb@localhost;

connection con4userc;
297
revoke all privileges on procedure sptest.p1 from userb@localhost;
298 299 300 301 302 303 304 305 306 307 308 309

connection con1root;
show grants for userb@localhost;

#cleanup
disconnect con4userc;
disconnect con3userb;
disconnect con2usera;
use test;
drop database sptest;
delete from mysql.user where user='usera' or user='userb' or user='userc';
delete from mysql.procs_priv where user='usera' or user='userb' or user='userc';
310 311 312
delete from mysql.tables_priv where user='usera';
flush privileges;
drop table t1;
313

314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344
#
# BUG#9503: reseting correct parameters of thread after error in SP function
#
connect (root,localhost,root,,test);
connection root;

--disable_warnings
drop function if exists bug_9503;
--enable_warnings
delimiter //;
create database mysqltest//
use mysqltest//
create table t1 (s1 int)//
grant select on t1 to user1@localhost//
create function bug_9503 () returns int sql security invoker begin declare v int;
select min(s1) into v from t1; return v; end//
delimiter ;//

connect (user1,localhost,user1,,test);
connection user1;
use mysqltest;
-- error 1370
select bug_9503();

connection root;
grant execute on function bug_9503 to user1@localhost;

connection user1;
do 1;
use test;

unknown's avatar
unknown committed
345
disconnect user1;
346 347 348 349 350
connection root;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop function bug_9503;
use test;
drop database mysqltest;
351

352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
#
# correct value from current_user() in function run from "security definer"
# (BUG#7291)
#
connection con1root;
use test;

select current_user();
select user();
create procedure bug7291_0 () sql security invoker select current_user(), user();
create procedure bug7291_1 () sql security definer call bug7291_0();
create procedure bug7291_2 () sql security invoker call bug7291_0();
grant execute on procedure bug7291_0 to user1@localhost;
grant execute on procedure bug7291_1 to user1@localhost;
grant execute on procedure bug7291_2 to user1@localhost;

connect (user1,localhost,user1,,);
connection user1;

call bug7291_2();
call bug7291_1();

connection con1root;
drop procedure bug7291_1;
drop procedure bug7291_2;
drop procedure bug7291_0;
disconnect user1;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop user user1@localhost;
381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406

#
# Bug #12318: Wrong error message when accessing an inaccessible stored
# procedure in another database when the current database is
# information_schema.
# 

--disable_warnings
drop database if exists mysqltest_1;
--enable_warnings

create database mysqltest_1;
delimiter //;
create procedure mysqltest_1.p1()
begin
   select 1 from dual;
end//
delimiter ;//

grant usage on *.* to mysqltest_1@localhost;

connect (n1,localhost,mysqltest_1,,information_schema,$MASTER_MYPORT,$MASTER_MYSOCK);
connection n1;
--error 1370
call mysqltest_1.p1();
disconnect n1;
407 408 409 410 411 412
# Test also without a current database
connect (n2,localhost,mysqltest_1,,*NO-ONE*,$MASTER_MYPORT,$MASTER_MYSOCK);
connection n2;
--error 1370
call mysqltest_1.p1();
disconnect n2;
413 414 415 416 417 418 419 420 421

connection default;

drop procedure mysqltest_1.p1;
drop database mysqltest_1;

revoke usage on *.* from mysqltest_1@localhost;
drop user mysqltest_1@localhost;

422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445
#
# BUG#12812 create view calling a function works without execute right
#           on function
delimiter |;
--disable_warnings
drop function if exists bug12812|
--enable_warnings
create function bug12812() returns char(2)
begin
  return 'ok';
end;
create user user_bug12812@localhost IDENTIFIED BY 'ABC'|
--replace_result $MASTER_MYPORT MYSQL_PORT $MASTER_MYSOCK MYSQL_SOCK
connect (test_user_12812,localhost,user_bug12812,ABC,test)|
--error 1370
SELECT test.bug12812()|
--error 1370
CREATE VIEW v1 AS SELECT test.bug12812()|
# Cleanup
connection default|
disconnect test_user_12812|
DROP USER user_bug12812@localhost|
drop function bug12812|
delimiter ;|
446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489


#
# BUG#14834: Server denies to execute Stored Procedure
#
# The problem here was with '_' in the database name.
#
create database db_bug14834;

create user user1_bug14834@localhost identified by '';
# The exact name of the database (no wildcard)
grant all on `db\_bug14834`.* to user1_bug14834@localhost;

create user user2_bug14834@localhost identified by '';
# The exact name of the database (no wildcard)
grant all on `db\_bug14834`.* to user2_bug14834@localhost;

create user user3_bug14834@localhost identified by '';
# Wildcards in the database name
grant all on `db__ug14834`.* to user3_bug14834@localhost;

connect (user1_bug14834,localhost,user1_bug14834,,db_bug14834);
# Create the procedure and check that we can call it
create procedure p_bug14834() select user(), current_user();
call p_bug14834();

connect (user2_bug14834,localhost,user2_bug14834,,db_bug14834);
# This didn't work before
call p_bug14834();

connect (user3_bug14834,localhost,user3_bug14834,,db_bug14834);
# Should also work
call p_bug14834();

# Cleanup
connection default;
disconnect user1_bug14834;
disconnect user2_bug14834;
disconnect user3_bug14834;
drop user user1_bug14834@localhost;
drop user user2_bug14834@localhost;
drop user user3_bug14834@localhost;
drop database db_bug14834;

490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527

#
# BUG#14533: 'desc tbl' in stored procedure causes error 1142
#
create database db_bug14533;
use db_bug14533;
create table t1 (id int);
create user user_bug14533@localhost identified by '';

create procedure bug14533_1()
    sql security definer
  desc db_bug14533.t1;

create procedure bug14533_2()
    sql security definer
   select * from db_bug14533.t1;

grant execute on procedure db_bug14533.bug14533_1 to user_bug14533@localhost;
grant execute on procedure db_bug14533.bug14533_2 to user_bug14533@localhost;

connect (user_bug14533,localhost,user_bug14533,,test);

# These should work
call db_bug14533.bug14533_1();
call db_bug14533.bug14533_2();

# For reference, these should not work
--error ER_TABLEACCESS_DENIED_ERROR
desc db_bug14533.t1;
--error ER_TABLEACCESS_DENIED_ERROR
select * from db_bug14533.t1;

# Cleanup
connection default;
disconnect user_bug14533;
drop user user_bug14533@localhost;
drop database db_bug14533;

528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547

#
# BUG#7787: Stored procedures: improper warning for "grant execute" statement
#

# Prepare.

CREATE DATABASE db_bug7787;
use db_bug7787;

# Test.

CREATE PROCEDURE p1()
  SHOW INNODB STATUS; 

GRANT EXECUTE ON PROCEDURE p1 TO user_bug7787@localhost; 

# Cleanup.

DROP DATABASE db_bug7787;
548
drop user user_bug7787@localhost;
549 550
use test;

551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650

#
# WL#2897: Complete definer support in the stored routines.
#
# The following cases are tested:
#   1. check that if DEFINER-clause is not explicitly specified, stored routines
#     are created with CURRENT_USER privileges;
#   2. check that if DEFINER-clause specifies non-current user, SUPER privilege
#     is required to create a stored routine;
#   3. check that if DEFINER-clause specifies non-existent user, a warning is
#     emitted.
#   4. check that SHOW CREATE PROCEDURE | FUNCTION works correctly;
#
# The following cases are tested in other test suites:
#   - check that mysqldump dumps new attribute correctly;
#   - check that slave replicates CREATE-statements with explicitly specified
#     DEFINER correctly.
#

# Setup the environment.

--echo
--echo ---> connection: root
--connection con1root

--disable_warnings
DROP DATABASE IF EXISTS mysqltest;
--enable_warnings

CREATE DATABASE mysqltest;

CREATE USER mysqltest_1@localhost;
GRANT ALL PRIVILEGES ON mysqltest.* TO mysqltest_1@localhost;

CREATE USER mysqltest_2@localhost;
GRANT SUPER ON *.* TO mysqltest_2@localhost;
GRANT ALL PRIVILEGES ON mysqltest.* TO mysqltest_2@localhost;

--connect (mysqltest_2_con,localhost,mysqltest_2,,mysqltest)
--connect (mysqltest_1_con,localhost,mysqltest_1,,mysqltest)

# test case (1).

--echo
--echo ---> connection: mysqltest_2_con
--connection mysqltest_2_con

use mysqltest;

CREATE PROCEDURE wl2897_p1() SELECT 1;

CREATE FUNCTION wl2897_f1() RETURNS INT RETURN 1;

# test case (2).

--echo
--echo ---> connection: mysqltest_1_con
--connection mysqltest_1_con

use mysqltest;

--error ER_SPECIFIC_ACCESS_DENIED_ERROR
CREATE DEFINER=root@localhost PROCEDURE wl2897_p2() SELECT 2;

--error ER_SPECIFIC_ACCESS_DENIED_ERROR
CREATE DEFINER=root@localhost FUNCTION wl2897_f2() RETURNS INT RETURN 2;

# test case (3).

--echo
--echo ---> connection: mysqltest_2_con
--connection mysqltest_2_con

use mysqltest;

CREATE DEFINER='a @ b @ c'@localhost PROCEDURE wl2897_p3() SELECT 3;

CREATE DEFINER='a @ b @ c'@localhost FUNCTION wl2897_f3() RETURNS INT RETURN 3;

# test case (4).

--echo
--echo ---> connection: con1root
--connection con1root

use mysqltest;

SHOW CREATE PROCEDURE wl2897_p1;
SHOW CREATE PROCEDURE wl2897_p3;

SHOW CREATE FUNCTION wl2897_f1;
SHOW CREATE FUNCTION wl2897_f3;

# Cleanup.

DROP USER mysqltest_1@localhost;
DROP USER mysqltest_2@localhost;

DROP DATABASE mysqltest;

651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745
--disconnect mysqltest_1_con
--disconnect mysqltest_2_con


#
# BUG#13198: SP executes if definer does not exist
#

# Prepare environment.

--echo
--echo ---> connection: root
--connection con1root

--disable_warnings
DROP DATABASE IF EXISTS mysqltest;
--enable_warnings

CREATE DATABASE mysqltest;

CREATE USER mysqltest_1@localhost;
GRANT ALL PRIVILEGES ON mysqltest.* TO mysqltest_1@localhost;

CREATE USER mysqltest_2@localhost;
GRANT ALL PRIVILEGES ON mysqltest.* TO mysqltest_2@localhost;

--connect (mysqltest_1_con,localhost,mysqltest_1,,mysqltest)
--connect (mysqltest_2_con,localhost,mysqltest_2,,mysqltest)

# Create a procedure/function under u1.

--echo
--echo ---> connection: mysqltest_1_con
--connection mysqltest_1_con

use mysqltest;

CREATE PROCEDURE bug13198_p1()
  SELECT 1;

CREATE FUNCTION bug13198_f1() RETURNS INT
  RETURN 1;

CALL bug13198_p1();

SELECT bug13198_f1();

# Check that u2 can call the procedure/function.

--echo
--echo ---> connection: mysqltest_2_con
--connection mysqltest_2_con

use mysqltest;

CALL bug13198_p1();

SELECT bug13198_f1();

# Drop user u1 (definer of the object);

--echo
--echo ---> connection: root
--connection con1root

--disconnect mysqltest_1_con

DROP USER mysqltest_1@localhost;

# Check that u2 can not call the procedure/function.

--echo
--echo ---> connection: mysqltest_2_con
--connection mysqltest_2_con

use mysqltest;

--error ER_NO_SUCH_USER
CALL bug13198_p1();

--error ER_NO_SUCH_USER
SELECT bug13198_f1();

# Cleanup.

--echo
--echo ---> connection: root
--connection con1root

--disconnect mysqltest_2_con

DROP USER mysqltest_2@localhost;

DROP DATABASE mysqltest;

746

747
# End of 5.0 bugs.