1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
<?php header("Content-type:text/html;charset=euckr"); @session_start();
define('G5_ESCAPE_FUNCTION', 'sql_escape_string'); define('G5_ESCAPE_PATTERN', '/(and|or).*(union|select|insert|update|delete|from|where|limit|create|drop).*/i'); define('G5_ESCAPE_REPLACE', '');
// SQL Injection 대응 문자열 필터링 function sql_escape_string($str) { if(defined('G5_ESCAPE_PATTERN') && defined('G5_ESCAPE_REPLACE')) { $pattern = G5_ESCAPE_PATTERN; $replace = G5_ESCAPE_REPLACE;
if($pattern) $str = preg_replace($pattern, $replace, $str); }
$str = call_user_func('addslashes', $str);
return $str; }
//============================================================================== // SQL Injection 등으로 부터 보호를 위해 sql_escape_string() 적용 //------------------------------------------------------------------------------ // magic_quotes_gpc 에 의한 backslashes 제거 if (get_magic_quotes_gpc()) { $_POST = array_map_deep('stripslashes', $_POST); $_GET = array_map_deep('stripslashes', $_GET); $_COOKIE = array_map_deep('stripslashes', $_COOKIE); $_REQUEST = array_map_deep('stripslashes', $_REQUEST); }
// sql_escape_string 적용 // 아래해당부분 오류가 떠서 현재는 실행 중지 /*$_POST = array_map_deep(G5_ESCAPE_FUNCTION, $_POST); $_GET = array_map_deep(G5_ESCAPE_FUNCTION, $_GET); $_COOKIE = array_map_deep(G5_ESCAPE_FUNCTION, $_COOKIE); $_REQUEST = array_map_deep(G5_ESCAPE_FUNCTION, $_REQUEST);*/ //==============================================================================
@extract($_REQUEST); @extract($_SESSION); @extract($_COOKIE); @extract($_FILES);
foreach($_FILES as $key=>$val){ if($key=='add_file'){ $add_file = $val['tmp_name']; $add_file_name = $val['name']; } } ?>
|