|
1
|
|
|
<?php |
|
2
|
|
|
/** |
|
3
|
|
|
* Protect against some common security flaws |
|
4
|
|
|
*/ |
|
5
|
|
|
|
|
6
|
|
|
error_reporting(E_ALL & ~E_NOTICE & ~E_STRICT & ~E_DEPRECATED); |
|
7
|
|
|
|
|
8
|
|
|
// Null is evil |
|
9
|
|
|
if (isset($_SERVER['QUERY_STRING']) && strpos(urldecode($_SERVER['QUERY_STRING']), chr(0)) !== false) { |
|
10
|
|
|
die(); |
|
11
|
|
|
} |
|
12
|
|
|
|
|
13
|
|
|
global $sanitize_seed; |
|
|
|
|
|
|
14
|
|
|
$sanitize_seed = 'sanitize_seed_' . base_convert(md5(__FILE__), 16, 36); |
|
15
|
|
|
|
|
16
|
|
|
// sanitize array |
|
17
|
|
|
if (!function_exists('modx_sanitize_gpc')) { |
|
18
|
|
|
/** |
|
19
|
|
|
* @param array|string $values |
|
20
|
|
|
* @param int $depth |
|
21
|
|
|
* @return array|string |
|
22
|
|
|
*/ |
|
23
|
|
|
function modx_sanitize_gpc(& $values, $depth = 0) |
|
|
|
|
|
|
24
|
|
|
{ |
|
25
|
|
|
if (200 < $depth) { |
|
26
|
|
|
exit('GPC Array nested too deep!'); |
|
|
|
|
|
|
27
|
|
|
} |
|
28
|
|
|
if (is_array($values)) { |
|
29
|
|
|
$depth++; |
|
30
|
|
|
foreach ($values as $key => $value) { |
|
31
|
|
|
if (is_array($value)) { |
|
32
|
|
|
modx_sanitize_gpc($value, $depth); |
|
33
|
|
|
} else { |
|
34
|
|
|
$values[$key] = getSanitizedValue($value); |
|
35
|
|
|
} |
|
36
|
|
|
} |
|
37
|
|
|
} else { |
|
38
|
|
|
$values = getSanitizedValue($values); |
|
39
|
|
|
} |
|
40
|
|
|
|
|
41
|
|
|
return $values; |
|
42
|
|
|
} |
|
43
|
|
|
} |
|
44
|
|
|
|
|
45
|
|
|
/** |
|
46
|
|
|
* @param string $value |
|
47
|
|
|
* @return string |
|
|
|
|
|
|
48
|
|
|
*/ |
|
49
|
|
|
function getSanitizedValue($value = '') |
|
50
|
|
|
{ |
|
51
|
|
|
global $sanitize_seed; |
|
|
|
|
|
|
52
|
|
|
|
|
53
|
|
|
if (empty($value)) { |
|
54
|
|
|
return $value; |
|
55
|
|
|
} |
|
56
|
|
|
|
|
57
|
|
|
$brackets = explode(' ', '[[ ]] [! !] [* *] [( )] {{ }} [+ +] [~ ~] [^ ^]'); |
|
58
|
|
|
foreach ($brackets as $bracket) { |
|
59
|
|
|
if (strpos($value, $bracket) === false) { |
|
60
|
|
|
continue; |
|
61
|
|
|
} |
|
62
|
|
|
$sanitizedBracket = str_replace('#', $sanitize_seed, |
|
63
|
|
|
sprintf('#%s#%s#', substr($bracket, 0, 1), substr($bracket, 1, 1))); |
|
64
|
|
|
$value = str_replace($bracket, $sanitizedBracket, $value); |
|
65
|
|
|
} |
|
66
|
|
|
$value = str_ireplace('<script', 'sanitized_by_modx<s cript', $value); |
|
67
|
|
|
$value = preg_replace('/&#(\d+);/', 'sanitized_by_modx& #$1', $value); |
|
68
|
|
|
|
|
69
|
|
|
return $value; |
|
70
|
|
|
} |
|
71
|
|
|
|
|
72
|
|
|
modx_sanitize_gpc($_GET); |
|
73
|
|
|
if (!defined('IN_MANAGER_MODE') || IN_MANAGER_MODE !== true) { |
|
74
|
|
|
modx_sanitize_gpc($_POST); |
|
75
|
|
|
} |
|
76
|
|
|
modx_sanitize_gpc($_COOKIE); |
|
77
|
|
|
modx_sanitize_gpc($_REQUEST); |
|
78
|
|
|
|
|
79
|
|
|
foreach (array('PHP_SELF', 'HTTP_USER_AGENT', 'HTTP_REFERER', 'QUERY_STRING') as $key) { |
|
80
|
|
|
$_SERVER[$key] = isset ($_SERVER[$key]) ? htmlspecialchars($_SERVER[$key], ENT_QUOTES) : null; |
|
81
|
|
|
} |
|
82
|
|
|
|
|
83
|
|
|
// Unset vars |
|
84
|
|
|
unset ($key, $value); |
|
85
|
|
|
|
Instead of relying on
globalstate, we recommend one of these alternatives:1. Pass all data via parameters
2. Create a class that maintains your state