Blind SQL Injection 대응 코드 추가
This commit is contained in:
20
common.php
20
common.php
@ -69,21 +69,21 @@ if (file_exists($dbconfig_file)) {
|
||||
if (defined(G5_TIMEZONE)) @mysql_query(" set time_zone = '".G5_TIMEZONE."'");
|
||||
|
||||
//==============================================================================
|
||||
// SQL Injection 등으로 부터 보호를 위해 mysql_real_escape_string() 적용
|
||||
// SQL Injection 등으로 부터 보호를 위해 sql_escape_string() 적용
|
||||
//------------------------------------------------------------------------------
|
||||
// magic_quotes_gpc 에 의한 backslashes 제거
|
||||
if (get_magic_quotes_gpc()) {
|
||||
$_POST = array_map_deep('stripslashes', $_POST);
|
||||
$_GET = array_map_deep('stripslashes', $_GET);
|
||||
$_COOKIE = array_map_deep('stripslashes', $_COOKIE);
|
||||
$_REQUEST = array_map_deep('stripslashes', $_REQUEST);
|
||||
$_POST = array_map_deep('stripslashes', $_POST);
|
||||
$_GET = array_map_deep('stripslashes', $_GET);
|
||||
$_COOKIE = array_map_deep('stripslashes', $_COOKIE);
|
||||
$_REQUEST = array_map_deep('stripslashes', $_REQUEST);
|
||||
}
|
||||
|
||||
// mysql_real_escape_string 적용
|
||||
$_POST = array_map_deep(G5_ESCAPE_FUNCTION, $_POST);
|
||||
$_GET = array_map_deep(G5_ESCAPE_FUNCTION, $_GET);
|
||||
$_COOKIE = array_map_deep(G5_ESCAPE_FUNCTION, $_COOKIE);
|
||||
$_REQUEST = array_map_deep(G5_ESCAPE_FUNCTION, $_REQUEST);
|
||||
// sql_escape_string 적용
|
||||
$_POST = array_map_deep('sql_escape_string', $_POST);
|
||||
$_GET = array_map_deep('sql_escape_string', $_GET);
|
||||
$_COOKIE = array_map_deep('sql_escape_string', $_COOKIE);
|
||||
$_REQUEST = array_map_deep('sql_escape_string', $_REQUEST);
|
||||
//==============================================================================
|
||||
|
||||
// PHP 4.1.0 부터 지원됨
|
||||
|
||||
Reference in New Issue
Block a user