Viewing file: grab_globals.lib.php (5.38 KB) -rw-rw-rw- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php /* $Id: grab_globals.lib.php,v 2.20.2.1 2005/12/07 08:08:52 lem9 Exp $ */ // vim: expandtab sw=4 ts=4 sts=4:
/** * This library grabs the names and values of the variables sent or posted to a * script in the $_* arrays and sets simple globals variables from them. It does * the same work for the $PHP_SELF, $HTTP_ACCEPT_LANGUAGE and * $HTTP_AUTHORIZATION variables. * * loic1 - 2001/25/11: use the new globals arrays defined with php 4.1+ */
// just to be sure there was no import (registering) before here $variables_whitelist = array ( 'GLOBALS', '_SERVER', '_GET', '_POST', '_REQUEST', '_FILES', '_ENV', '_COOKIE', );
foreach ( get_defined_vars() as $key => $value ) { if ( ! in_array( $key, $variables_whitelist ) ) { unset( $$key ); } } unset( $key, $value );
// protect against older PHP versions' bug about GLOBALS overwrite // (no need to translate this one :) ) // but what if script.php?GLOABLS[admin]=1&GLOBALS[_REQUEST]=1 ??? if ( isset( $_REQUEST['GLOBALS'] ) || isset( $_FILES['GLOBALS'] ) || isset( $_SERVER['GLOBALS'] ) || isset( $_COOKIE['GLOBALS'] ) || isset( $_ENV['GLOBALS'] ) ) { die( 'GLOBALS overwrite attempt' ); }
require_once './libraries/session.inc.php';
/** * @var array $_import_blacklist variable names that should NEVER be imported * from superglobals */ $_import_blacklist = array( '/^cfg$/i', // PMA configuration '/^GLOBALS$/i', // the global scope '/^str.*$/i', // PMA strings '/^_.*$/i', // PMA does not use variables starting with _ from extern '/^.*\s+.*$/i', // no whitespaces anywhere '/^[0-9]+.*$/i', // numeric variable names //'/^PMA_.*$/i', // other PMA variables );
/** * copy values from one array to another, usally from a superglobal into $GLOBALS * * @uses $GLOBALS['_import_blacklist'] * @uses preg_replace() * @uses array_keys() * @uses array_unique() * @uses get_magic_quotes_gpc() to check wether stripslashes or not * @uses stripslashes() * @param array $array values from * @param array $target values to * @param boolean $sanitize prevent importing key names in $_import_blacklist */ function PMA_gpc_extract($array, &$target, $sanitize = TRUE) { if (!is_array($array)) { return FALSE; }
if ( $sanitize ) { $valid_variables = preg_replace( $GLOBALS['_import_blacklist'], '', array_keys( $array ) ); $valid_variables = array_unique( $valid_variables ); } else { $valid_variables = array_keys( $array ); }
$is_magic_quotes = get_magic_quotes_gpc();
foreach ( $valid_variables as $key ) {
if ( strlen( $key ) === 0 ) { continue; }
if ( is_array( $array[$key] ) ) { // there could be a variable coming from a cookie of // another application, with the same name as this array unset($target[$key]);
PMA_gpc_extract($array[$key], $target[$key], FALSE); } elseif ($is_magic_quotes) { $target[$key] = stripslashes($array[$key]); } else { $target[$key] = $array[$key]; } } return TRUE; }
// check if a subform is submitted $__redirect = NULL; if ( isset( $_POST['usesubform'] ) ) { // if a subform is present and should be used // the rest of the form is deprecated $subform_id = key( $_POST['usesubform'] ); $subform = $_POST['subform'][$subform_id]; $_POST = $subform; if ( isset( $_POST['redirect'] ) && $_POST['redirect'] != basename( $_SERVER['PHP_SELF'] ) ) { $__redirect = $_POST['redirect']; unset( $_POST['redirect'] ); } // end if ( isset( $_POST['redirect'] ) ) unset( $subform_id, $subform ); } // end if ( isset( $_POST['usesubform'] ) ) // end check if a subform is submitted
if (!empty($_GET)) { PMA_gpc_extract($_GET, $GLOBALS); } // end if
if (!empty($_POST)) { PMA_gpc_extract($_POST, $GLOBALS); } // end if (!empty($_POST))
if (!empty($_FILES)) { foreach ($_FILES AS $name => $value) { $$name = $value['tmp_name']; ${$name . '_name'} = $value['name']; } } // end if unset( $name, $value );
if (!empty($_SERVER)) { $server_vars = array('PHP_SELF', 'HTTP_ACCEPT_LANGUAGE', 'HTTP_AUTHORIZATION'); foreach ( $server_vars as $current ) { // its not important HOW we detect html tags // its more important to prevent XSS // so its not important if we result in an invalid string, // its even better than a XSS capable string if ( isset( $_SERVER[$current] ) && false === strpos( $_SERVER[$current], '<' ) ) { $$current = $_SERVER[$current]; // already importet by register_globals? } elseif ( ! isset( $$current ) || false !== strpos( $$current, '<' ) ) { $$current = ''; } } unset( $server_vars, $current ); } // end if
// Security fix: disallow accessing serious server files via "?goto=" if (isset($goto) && strpos(' ' . $goto, '/') > 0 && substr($goto, 0, 2) != './') { unset($goto); } // end if
unset( $_import_blacklist );
if ( ! empty( $__redirect ) ) { // TODO: ensure that PMA_securePath() is defined and available // for this script. Meanwhile we duplicate what this function does: require('./' . preg_replace('@\.\.*@','.',$__redirect)); exit(); } // end if ( ! empty( $__redirect ) ) ?>
|