phpº¯Êýget_magic_quotes_gpcÏê½â
set_magic_quotes_runtimeÊÇÓÃÀ´ÉèÖÃPHP »·¾³ÅäÖõıäÁ¿ magic_quotes_runtime Öµ¡£
0-¹Ø±Õ 1-´ò¿ª
³ÌÐòÖмì²â״̬ÓÃget_magic_quotes_runtime,·µ»Ø 0 ±íʾ¹Ø±Õ±¾¹¦ÄÜ£»·µ»Ø 1 ±íʾ±¾¹¦ÄÜ´ò¿ª¡£Èô
magic_quotes_runtime ´ò¿ªÊ±£¬ËùÓÐÍⲿÒýÈëµÄÊý¾Ý¿â×ÊÁÏ»òÕßÎļþµÈµÈ¶¼»á×Ô¶¯×ªÎªº¬Óз´Ð±ÏßÒç³ö×Ö·ûµÄ×ÊÁÏ¡£
±¾
º¯ÊýÈ¡µÃ PHP »·¾³ÅäÖõıäÁ¿ magic_quotes_gpc (GPC, Get/Post/Cookie) Öµ¡£·µ»Ø 0
±íʾ¹Ø±Õ±¾¹¦ÄÜ£»·µ»Ø 1 ±íʾ±¾¹¦ÄÜ´ò¿ª¡£µ± magic_quotes_gpc ´ò¿ªÊ±£¬ËùÓÐµÄ ' (µ¥ÒýºÅ), " (Ë«ÒýºÅ), \
(·´Ð±Ïß) and ¿Õ×Ö·û»á×Ô¶¯¼ÓÉÏתÒå·û\;
ĬÈÏÇé¿öÏ£¬PHP Ö¸Áîmagic_quotes_gpcΪ on
£¬ËüÖ÷ÒªÊǶÔËùÓÐµÄ GET¡¢POST ºÍ COOKIE (¼´G P C)Êý¾Ý×Ô¶¯ÔËÐÐ addslashes()
¡£²»Òª¶ÔÒѾ±»
magic_quotes_gpc
תÒå¹ýµÄ×Ö·û´®Ê¹Óà addslashes()
£¬ÒòΪÕâÑù»áµ¼ÖÂË«²ãתÒå¡£Óöµ½ÕâÖÖÇé¿öʱ¿ÉÒÔʹÓú¯Êý
get_
magic_quotes_gpc()
½øÐмì²â¡£
ÆäʵÕâ¸öº¯Êý¾ÍÊÇÅжÏÓÐPHPÓÐûÓÐ×Ô¶¯µ÷ÓÃaddslashes
Õâ¸öº¯Êý,
ÏÂÃæÊÇÀý×Ó,ÆäʵҲÊÇ´ÓÊÖ²áÉÏŪÏÂÀ´µÄ,´«¹ýÀ´¾ÍΪ×Ô¼º¿´×Å·½±ã,ÒòΪ×Ô¼º¼ÇÐÔ²»ºÃ..
<
html
>
<!--ÒÔPOST·½Ê½´«¹ýÈ¥Ò»¸ö´øÓе¥ÒýºÅµÄ×Ö·û´® -->
<
body
>
<
form
action
="first.php"
method
="post"
>
<
input
type
="text"
name
="lastname"
value
="Simao'pig"
>
<
input
type
="submit"
value
="Ìá½»"
>
</
form
>
</
body
>
</
html
>
<?php
echo
get_magic_quotes_gpc
(); &nb
Ïà¹ØÎĵµ£º
Session¼ò½é
session ·Ö³ÉÁ½²¿·Ö£¬session¿Õ¼ä´æ·ÅÓÚ·þÎñÆ÷¶Ë£¬´ò¿ª¿Õ¼äµÄID ´æ·ÅÓÚ ¿Í»§¶ËµÄcookie£¬ Èç¹û¿Í»§¶Ë¹Ø±ÕÁËcookie£¬session¾Í²»ÄÜÕý³£µÄʹÓá£
SessionµÄÖÐÎÄÒëÃû½Ð×ö“»á»°”£¬Æä±¾À´µÄº¬ÒåÊÇÖ¸ÓÐʼÓÐÖÕµÄһϵÁж¯×÷/ÏûÏ¢£¬±ÈÈç´òµç»°Ê±´ÓÄÃÆðµç»°²¦ºÅµ½¹Ò¶Ïµç»°ÕâÖмäµÄһϵÁйý³Ì¿ÉÒÔ³Æ ......
·þÎñÆ÷±äÁ¿ $_SERVER Ïê½â£º
1¡¢$_SESSION['PHP_SELF'] -- »ñÈ¡µ±Ç°ÕýÔÚÖ´Ðнű¾µÄÎļþÃû
2¡¢$_SERVER['SERVER_PROTOCOL'] -- ÇëÇóÒ³ÃæÊ±Í¨ÐÅÐÒéµÄÃû³ÆºÍ°æ±¾¡£ÀýÈ磬“HTTP/1.0”¡£
3¡¢$_SERVER['REQUEST_TIME'] -- ÇëÇó¿ªÊ¼Ê±µÄʱ¼ä´Á¡£´Ó PHP 5.1.0 ÆðÓÐЧ¡£ºÍtimeº¯ÊýЧ¹ûÒ»Ñù¡£
4¡¢$_SERVER['argv'] - ......
½â¾öµÄ°ì·¨Óкü¸¸ö£º
µÚÒ»¸öÊÇ£ºstr_split()£¬Õâ¸ö·½·¨ÊÇPHP5¼ÓÈëµÄ¡£
<?php
$str = "Hello Friend";
$arr1 = str_split($str);
$arr2 = str_split($str, 3);
print_r($arr1);
print_r($arr2);
?>
Êä³ö¾ÍÊÇ£º
Array
(
[0] => H
[1] => e
[2] => l
[3] => l
......
×öPHP³ÌÐòµÄÈ˶¼ÖªµÀhtmlentitiesºÍhtmlspecialcharsº¯Êý£¬¶¼ÊǸñʽ»¯html´úÂëµÄ£¬µ«ÊÇÕâ¶þ¸öº¯ÊýÊÇ·ñÕæµÄ¹¦ÄÜÒ»ÑùÂ𣿠php³ÌÐòÔ±Ö®¼Ò ÕâÁ½¸öº¯ÊýÔÚ¸ñʽ»¯´øÓÐÓ¢ÎÄ×Ö·ûµÄhtml´úÂëµÄʱºò»ù±¾Ã»É¶ÎÊÌ⣬µ«ÊÇhtmlentities¶ÔÖÐÎÄ×Ö·ûÒ²²»·Å¹ý£¬ÕâÑùµÃ³öÀ´µÄ½á¹ûÊÇÖÐÎÄ×Ö·û²¿·Ö±äΪһ¶ÑÂÒÂë¡£µ±Ê±×öÓ¢ÎÄÕ¾µÄʱºò¸ù±¾¾Íû¾õ²ìµ ......
OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......