Union based SQL injection 취약점 수정

This commit is contained in:
thisgun
2024-02-15 15:26:33 +09:00
parent 248cb2b173
commit c1c4089883
4 changed files with 13 additions and 1 deletions

View File

@ -4,6 +4,10 @@ include_once('./_common.php');
auth_check_menu($auth, $sub_menu, "r");
if (isset($sfl) && $sfl && !in_array($sfl, array('it_name','it_id','it_maker','it_brand','it_model','it_origin','it_sell_email'))) {
$sfl = '';
}
$g5['title'] = '상품관리';
include_once (G5_ADMIN_PATH.'/admin.head.php');

View File

@ -4,6 +4,10 @@ include_once('./_common.php');
auth_check_menu($auth, $sub_menu, "r");
if (isset($sfl) && $sfl && !in_array($sfl, array('it_name','a.it_id'))) {
$sfl = '';
}
$g5['title'] = '상품문의';
include_once (G5_ADMIN_PATH.'/admin.head.php');

View File

@ -4,6 +4,10 @@ include_once('./_common.php');
auth_check_menu($auth, $sub_menu, "r");
if (isset($sfl) && $sfl && !in_array($sfl, array('it_name','a.it_id','is_name'))) {
$sfl = '';
}
$g5['title'] = '사용후기';
include_once (G5_ADMIN_PATH.'/admin.head.php');

View File

@ -426,7 +426,7 @@ if (isset($_REQUEST['sca'])) {
if (isset($_REQUEST['sfl'])) {
$sfl = trim($_REQUEST['sfl']);
$sfl = preg_replace("/[\<\>\'\"\\\'\\\"\%\=\(\)\/\^\*\s]/", "", $sfl);
$sfl = preg_replace("/[\<\>\'\"\\\'\\\"\%\=\(\)\/\^\*\s\#]/", "", $sfl);
if ($sfl)
$qstr .= '&amp;sfl=' . urlencode($sfl); // search field (검색 필드)
} else {