1
|
|
|
<?php |
2
|
|
|
/** |
3
|
|
|
* Protect against some common security flaws |
4
|
|
|
*/ |
5
|
|
|
|
6
|
|
|
error_reporting(E_ALL & ~E_NOTICE & ~E_STRICT & ~E_DEPRECATED); |
7
|
|
|
|
8
|
|
|
// Null is evil |
9
|
|
|
if (isset($_SERVER['QUERY_STRING']) && strpos(urldecode($_SERVER['QUERY_STRING']), chr(0)) !== false) { |
10
|
|
|
die(); |
11
|
|
|
} |
12
|
|
|
|
13
|
|
|
global $sanitize_seed; |
|
|
|
|
14
|
|
|
$sanitize_seed = 'sanitize_seed_' . base_convert(md5(__FILE__), 16, 36); |
15
|
|
|
|
16
|
|
|
// sanitize array |
17
|
|
|
if (!function_exists('modx_sanitize_gpc')) { |
18
|
|
|
/** |
19
|
|
|
* @param array|string $values |
20
|
|
|
* @param int $depth |
21
|
|
|
* @return array|string |
22
|
|
|
*/ |
23
|
|
|
function modx_sanitize_gpc(& $values, $depth = 0) |
|
|
|
|
24
|
|
|
{ |
25
|
|
|
if (200 < $depth) { |
26
|
|
|
exit('GPC Array nested too deep!'); |
|
|
|
|
27
|
|
|
} |
28
|
|
|
if (is_array($values)) { |
29
|
|
|
$depth++; |
30
|
|
|
foreach ($values as $key => $value) { |
31
|
|
|
if (is_array($value)) { |
32
|
|
|
modx_sanitize_gpc($value, $depth); |
33
|
|
|
} else { |
34
|
|
|
$values[$key] = getSanitizedValue($value); |
35
|
|
|
} |
36
|
|
|
} |
37
|
|
|
} else { |
38
|
|
|
$values = getSanitizedValue($values); |
39
|
|
|
} |
40
|
|
|
|
41
|
|
|
return $values; |
42
|
|
|
} |
43
|
|
|
} |
44
|
|
|
|
45
|
|
|
/** |
46
|
|
|
* @param string $value |
47
|
|
|
* @return string |
|
|
|
|
48
|
|
|
*/ |
49
|
|
|
function getSanitizedValue($value = '') |
50
|
|
|
{ |
51
|
|
|
global $sanitize_seed; |
|
|
|
|
52
|
|
|
|
53
|
|
|
if (empty($value)) { |
54
|
|
|
return $value; |
55
|
|
|
} |
56
|
|
|
|
57
|
|
|
$brackets = explode(' ', '[[ ]] [! !] [* *] [( )] {{ }} [+ +] [~ ~] [^ ^]'); |
58
|
|
|
foreach ($brackets as $bracket) { |
59
|
|
|
if (strpos($value, $bracket) === false) { |
60
|
|
|
continue; |
61
|
|
|
} |
62
|
|
|
$sanitizedBracket = str_replace('#', $sanitize_seed, |
63
|
|
|
sprintf('#%s#%s#', substr($bracket, 0, 1), substr($bracket, 1, 1))); |
64
|
|
|
$value = str_replace($bracket, $sanitizedBracket, $value); |
65
|
|
|
} |
66
|
|
|
$value = str_ireplace('<script', 'sanitized_by_modx<s cript', $value); |
67
|
|
|
$value = preg_replace('/&#(\d+);/', 'sanitized_by_modx& #$1', $value); |
68
|
|
|
|
69
|
|
|
return $value; |
70
|
|
|
} |
71
|
|
|
|
72
|
|
|
modx_sanitize_gpc($_GET); |
73
|
|
|
if (!defined('IN_MANAGER_MODE') || IN_MANAGER_MODE !== true) { |
74
|
|
|
modx_sanitize_gpc($_POST); |
75
|
|
|
} |
76
|
|
|
modx_sanitize_gpc($_COOKIE); |
77
|
|
|
modx_sanitize_gpc($_REQUEST); |
78
|
|
|
|
79
|
|
|
foreach (array('PHP_SELF', 'HTTP_USER_AGENT', 'HTTP_REFERER', 'QUERY_STRING') as $key) { |
80
|
|
|
$_SERVER[$key] = isset ($_SERVER[$key]) ? htmlspecialchars($_SERVER[$key], ENT_QUOTES) : null; |
81
|
|
|
} |
82
|
|
|
|
83
|
|
|
// Unset vars |
84
|
|
|
unset ($key, $value); |
85
|
|
|
|
Instead of relying on
global
state, we recommend one of these alternatives:1. Pass all data via parameters
2. Create a class that maintains your state