PHP implements a general method to prevent sql injection
Release: 2016-07-25 08:45:29
Original
971 people have browsed it
- function inject_check($sql_str) {
- return eregi('select|insert|and|or|update|delete|'|/*|*|../|./|union|into|load_file|outfile' , $sql_str);
- }
- function verify_id($id=null) {
- if(!$id) {
- exit('No parameters submitted!');
- } elseif(inject_check($id)) {
- exit( 'The submitted parameter is illegal! ');
- } elseif(!is_numeric($id)) {
- exit('The submitted parameter is illegal!');
- }
- $id = intval($id);
-
- return $id ;
- }
- function str_check( $str ) {
- if(!get_magic_quotes_gpc()) {
- $str = addslashes($str); // Filter
- }
- $str = str_replace("_", "_", $str);
- $str = str_replace("%", "%", $str);
-
- return $str;
- }
- function post_check($post) {
- if(!get_magic_quotes_gpc()) {
- $post = addslashes($post);
- }
- $post = str_replace("_", "_", $post);
- $post = str_replace("%", "%", $post);
- $post = nl2br ($post);
- $post = htmlspecialchars($post);
-
- return $post;
- }
Copy code
|
PHP, sql
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Articles by Author
-
2024-10-22 09:46:29
-
2024-10-13 13:53:41
-
2024-10-12 12:15:51
-
2024-10-11 22:47:31
-
2024-10-11 19:36:51
-
2024-10-11 15:50:41
-
2024-10-11 15:07:41
-
2024-10-11 14:21:21
-
2024-10-11 12:59:11
-
2024-10-11 12:17:31