function check_int($val, $default_val) { $val = check_injection($val); if (is_null($val) == true) { $val = ""; } if (trim($val) == "") { $rtn_val = $default_val; } else { if (is_numeric($val) == true) { $rtn_val = $val; } else { echo "\n\t\t\t<script type=\"text/javascript\">\n\t\t\talert('잘못된 데이터가 넘어 왔습니다.');\n\t\t\thistory.back();\n\t\t\t</script>\n\t\t\t"; exit; } } return $rtn_val; }
//} } foreach ($_POST as $name => $value) { $_POST[$name] = fixup($value); //if (fixup($value) == true) { // header("Location: $webRoot/error.php?message=A script/sql injection attempt has been detected, system has logged all of your data!!!"); //} } foreach ($_REQUEST as $name => $value) { $_REQUEST[$name] = fixup($value); //if (fixup($value) == true) { // header("Location: $webRoot/error.php?message=A script/sql injection attempt has been detected, system has logged all of your data!!!"); //} } } check_injection(); function curPageURL() { $pageURL = 'http'; if ($_SERVER["HTTPS"] == "on") { $pageURL .= "s"; } $pageURL .= "://"; if ($_SERVER["SERVER_PORT"] != "80") { //$pageURL .= $_SERVER["SERVER_NAME"].":".$_SERVER["SERVER_PORT"].$_SERVER["REQUEST_URI"]; $pageURL .= getenv('HTTP_HOST') . ":" . $_SERVER["SERVER_PORT"] . $_SERVER["REQUEST_URI"]; } else { //$pageURL .= $_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]; $pageURL .= getenv('HTTP_HOST') . $_SERVER["REQUEST_URI"]; } return $pageURL;