* $Date:: $ *
* $Tag:: 0.2.1-FINAL $ *
* $Author:: $ *
- * Needs to be in all Files and every File needs "svn propset *
- * svn:keywords Date Revision" (autoprobset!) at least!!!!!! *
* -------------------------------------------------------------------- *
* Copyright (c) 2003 - 2009 by Roland Haeder *
- * Copyright (c) 2009, 2010 by Mailer Developer Team *
- * For more information visit: http://www.mxchange.org *
+ * Copyright (c) 2009 - 2012 by Mailer Developer Team *
+ * For more information visit: http://mxchange.org *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
************************************************************************/
// Run only once this security check/replacement
-if (defined('__SECURITY')) return;
+if (defined('__SECURITY')) {
+ return;
+} // END - if
// Some security stuff...
-if (strpos($_SERVER['PHP_SELF'], basename(__FILE__)) !== false) {
+if (strpos($_SERVER['PHP_SELF'], basename(__FILE__)) !== FALSE) {
die();
} // END - if
+// Include ctracker, recommended place!
+//require_once('ctracker.php');
+//require_once('ipfilter.php');
+
/**
* Function to secure input strings
*
- * @param $str The unsecured string
- * @param $strip Strip tags
- * @return $str A (hopefully) secured string against XSS and other bad things
+ * @param $str The unsecured string
+ * @param $stripTags Strip tags
+ * @return $str A (hopefully) secured string against XSS and other bad things
*/
-function secureString ($str, $strip = true, $encode = false) {
+function secureString ($str, $stripTags = TRUE, $encode = FALSE) {
// Shall we strip HTML code?
- if ($strip === true) $str = strip_tags($str);
+ if ($stripTags === TRUE) {
+ $str = strip_tags($str);
+ } // END - if
// Trim string
$str = trim($str);
// Encode in entities if requested
- if ($encode === true) {
+ if ($encode === TRUE) {
// Encode in entities (this breakes UTF-8!)
$str = htmlentities($str, ENT_QUOTES);
} // END - if
+ // Replace {,} with entities
+ $str = str_replace(array('{', '}'), array('{', '}'), $str);
+
// Return result
return $str;
}
$phpSelfFile = basename($_SERVER['PHP_SELF']);
// Check for a .php inside the $phpSelfDirectory...
- while (strpos($phpSelfDirectory, '.php') !== false) {
+ while (strpos($phpSelfDirectory, '.php') !== FALSE) {
// Correct the dirname
$phpSelfDirectory = substr($phpSelfDirectory, 0, (strpos($phpSelfDirectory, '.php') + 4));
// Rewrite filename...
$_SERVER['PHP_SELF'] = $phpSelfDirectory . '/' . $phpSelfFile;
// Did run...
- $GLOBALS['php_self_secured'] = true;
+ $GLOBALS['php_self_secured'] = TRUE;
// Remove uneccessary variables
unset($phpSelfDirectory);
unset($phpSelfFile);
}
+/**
+ * Checks if PHP_VERSION is newer or equal to given version string
+ *
+ * @param $versionString A PHP'ized version string which shall be compared with PHP_VERSION
+ * @return $isEqualNewer Wether the given version string is equal or newer to PHP_VERSION
+ */
+function isPhpVersionEqualNewer ($versionString) {
+ return (version_compare(PHP_VERSION, $versionString, '>='));
+}
+
/**
* Detects caching in PHP
*
*/
function detectPhpCaching () {
// Activate caching or transparent compressing when it is not already done
- if (phpversion() >= '4.0.4pl1' && (strstr(getenv('HTTP_USER_AGENT'),'compatible') || (strstr(getenv('HTTP_USER_AGENT'), 'Mozilla')))) {
+ if ((isPhpVersionEqualNewer('4.0.4pl1')) && (strstr(getenv('HTTP_USER_AGENT'),'compatible') || (strstr(getenv('HTTP_USER_AGENT'), 'Mozilla')))) {
if ((extension_loaded('zlib')) && (function_exists('ob_start'))) {
// Start caching
$GLOBALS['php_caching'] = 'on';
}
// Runtime/GPC quoting is off now...
-set_magic_quotes_runtime(false);
-ini_set('magic_quotes_gpc', false); // This may not work on some systems
+ini_set('magic_quotes_runtime', FALSE);
+ini_set('magic_quotes_gpc', FALSE); // This may not work on some systems
+
+/*
+ * No compatibility with Zend Engine 1, else an error like 'Implicit cloning'
+ * will be produced.
+ */
+if (isPhpVersionEqualNewer('5.0')) {
+ ini_set('zend.ze1_compatibility_mode', 'Off');
+} // END - if
// Check if important arrays are found and define them if missing
if (!isset($_SERVER)) {
$_POST = $GLOBALS['_POST'];
} // END - if
-// Include IP-Filter here
-//include("/usr/share/php/ipfilter.php");
-
// Generate arrays which holds the relevante chars to replace
$GLOBALS['security_chars'] = array(
// The chars we are looking for...
- 'from' => array('{', '}', '/', '.', "'", '$', '(', ')', '{--', '--}', '{?', '?}', '%', ';', '[', ']', ':', '--'),
+ 'from' => array('/', '.', chr(39), '$', '(', ')', '{--', '--}', '{?', '?}', '%', ';', '[', ']', ':', '--', chr(92), chr(39)),
// ... and we will replace to.
'to' => array(
- '{OPEN_ANCHOR2}',
- '{CLOSE_ANCHOR2}',
'{SLASH}',
'{DOT}',
'{QUOT}',
'{OPEN_INDEX}',
'{CLOSE_INDEX}',
'{DBL_DOT}',
- '{COMMENT}'
+ '{COMMENT}',
+ '{BACKSLASH}',
+ '{SQUOTE}'
),
);
-// Characters allowed in URLs
-//
-// Note: Do not replace 'to' with 'from' and vise-versa! When you do this all booked URLs will be
-// rejected because of the {SLASH}, {DOT} and all below listed items inside the URL.
+/*
+ * Characters allowed in booked URLs
+ *
+ * Note: Do not replace 'to' with 'from' and vise-versa! When you do this all booked URLs will be
+ * rejected because of the {SLASH}, {DOT} and all below listed items inside the URL.
+ */
$GLOBALS['url_chars'] = array(
// Search for these secured characters
'to' => array('{SLASH}', '{DOT}', '{PER}', '{DBL_DOT}', '{COMMENT}'),
unset($_GET[$seckey]);
} else {
// Only variables are allowed (non-array) but we secure them all!
- foreach ($GLOBALS['security_chars']['from'] as $key => $char) {
- // Pass all through
- $_GET[$seckey] = str_replace($char , $GLOBALS['security_chars']['to'][$key], $_GET[$seckey]);
- } // END - foreach
+ $_GET[$seckey] = str_replace($GLOBALS['security_chars']['from'], $GLOBALS['security_chars']['to'], $_GET[$seckey]);
// Strip all other out
$_GET[$seckey] = secureString($_GET[$seckey]);
} // END - foreach
} // END - if
+// Secure also $_POST data (only simple, no replace)
+if (is_array($_POST)) {
+ // Secure only simple data
+ foreach ($_POST as $seckey => $secvalue) {
+ // Is it an array?
+ if (!is_array($secvalue)) {
+ // Strip all other out
+ $_POST[$seckey] = secureString($_POST[$seckey]);
+ } // END - if
+ } // END - foreach
+} // END - if
+
// Detect PHP caching
detectPhpCaching();