Пример #1
0
function check_int($val, $default_val)
{
    $val = check_injection($val);
    if (is_null($val) == true) {
        $val = "";
    }
    if (trim($val) == "") {
        $rtn_val = $default_val;
    } else {
        if (is_numeric($val) == true) {
            $rtn_val = $val;
        } else {
            echo "\n\t\t\t<script type=\"text/javascript\">\n\t\t\talert('잘못된 데이터가 넘어 왔습니다.');\n\t\t\thistory.back();\n\t\t\t</script>\n\t\t\t";
            exit;
        }
    }
    return $rtn_val;
}
Пример #2
0
        //}
    }
    foreach ($_POST as $name => $value) {
        $_POST[$name] = fixup($value);
        //if (fixup($value) == true) {
        //	header("Location: $webRoot/error.php?message=A script/sql injection attempt has been detected, system has logged all of your data!!!");
        //}
    }
    foreach ($_REQUEST as $name => $value) {
        $_REQUEST[$name] = fixup($value);
        //if (fixup($value) == true) {
        //	header("Location: $webRoot/error.php?message=A script/sql injection attempt has been detected, system has logged all of your data!!!");
        //}
    }
}
check_injection();
function curPageURL()
{
    $pageURL = 'http';
    if ($_SERVER["HTTPS"] == "on") {
        $pageURL .= "s";
    }
    $pageURL .= "://";
    if ($_SERVER["SERVER_PORT"] != "80") {
        //$pageURL .= $_SERVER["SERVER_NAME"].":".$_SERVER["SERVER_PORT"].$_SERVER["REQUEST_URI"];
        $pageURL .= getenv('HTTP_HOST') . ":" . $_SERVER["SERVER_PORT"] . $_SERVER["REQUEST_URI"];
    } else {
        //$pageURL .= $_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"];
        $pageURL .= getenv('HTTP_HOST') . $_SERVER["REQUEST_URI"];
    }
    return $pageURL;