I'm working on a project involving a form and PHP script that allows users to put information into a database. The pages are restricted, and each user has their own username/password to gain access to the form. I save their username (taken from $PHP_AUTH_USER) in the database together with whatever information they submit, so that I can track who has been putting what into the DB.
We are running the latest versions of Apache with SSL, MySQL and PHP on Solaris 7. The pages are secure (they send the certificate and all that). The users have no access to store or run their own files on the web server. There's no fancy verification stuff going on..just .htaccess files with the htpasswd generated password file.
Can anyone point out any security issues that might arise using this setup? My concern is that there might be somehow to mess with the $PHP_AUTH_USER variable so that a malicious user might be able to enter information into the DB with another users name, without knowing their password.
Obviously, their are all the obvious concerns about browers in public terminals saving passwords and all that. I'm looking for problems which I can fix from the server side.