fixed an issue with conditions building which didn't properly escapse special characters, leaving yourself open to remote SQL injection if passing direct user-input into a condition

This commit is contained in:
2007-12-14 01:30:16 +00:00
parent 70eafd692c
commit 39b158e005

View File

@@ -633,7 +633,7 @@ class LiteMySQL {
} elseif ( preg_match('/^[0-9]+$/', $value) ) {
$cond[] = "`id` = '".$value."'";
} else {
$cond[] = $value;
$cond[] = $this->sql_quote($value);
}
}
$operator = ( !empty($options['operator']) ) ? $options['operator'] : 'AND' ;
@@ -694,6 +694,8 @@ class LiteMySQL {
}
if ( ($column == 'integer' || $column == 'float') && preg_match('/^[0-9\-\.]+$/', $string) ) {
return $string;
} elseif ( preg_match('/^[0-9\-\.]+$/', $string) ) {
return $string;
} else {
return "'".addslashes($string)."'";
}