The example in this article describes how php can quickly find malicious code in the database. Share it with everyone for your reference. The details are as follows:
The database has been entered with malicious code. In order to ensure the security of your database, you must clean it carefully. With the following super convenient function, you can quickly remove malicious code from your database.
function cleanInput($input) { $search = array( '@]*?>.*?@si', // Strip out javascript '@<[\/\!]*?[^<>]*?>@si', // Strip out HTML tags '@ ]*?>.*? @siU', // Strip style tags properly '@@' // Strip multi-line comments ); $output = preg_replace($search, '', $input); return $output; } function sanitize($input) { if (is_array($input)) { foreach($input as $var=>$val) { $output[$var] = sanitize($val); } } else { if (get_magic_quotes_gpc()) { $input = stripslashes($input); } $input = cleanInput($input); $output = mysql_real_escape_string($input); } return $output; } // Usage: $bad_string = "Hi! It's a good day!"; $good_string = sanitize($bad_string); // $good_string returns "Hi! It\'s a good day!" // Also use for getting POST/GET variables $_POST = sanitize($_POST); $_GET = sanitize($_GET);
I hope this article will be helpful to everyone’s PHP programming design.