ON DELETE ON UPDATE
[phpmyadmin/crack.git] / tbl_replace_fields.php3
blob2ccd0b503b1e786197d1281b42035d41bbc40049
1 <?php
2 /* $Id$ */
3 // vim: expandtab sw=4 ts=4 sts=4:
5 // note: grab_globals has extracted the fields from _FILES
6 // or HTTP_POST_FILES
8 // Check parameters
10 if (!defined('PMA_COMMON_LIB_INCLUDED')) {
11 include('./libraries/common.lib.php3');
14 PMA_checkParameters(array('db','encoded_key'));
17 // f i e l d u p l o a d e d f r o m a f i l e
19 // garvin: original if-clause checked, whether input was stored in a possible fields_upload_XX var.
20 // Now check, if the field is set. If it is empty or a malicious file, do not alter fields contents.
21 // If an empty or invalid file is specified, the binary data gets deleter. Maybe a nice
22 // new text-variable is appropriate to document this behaviour.
24 // garvin: security cautions! You could trick the form and submit any file the webserver has access to
25 // for upload to a binary field. Shouldn't be that easy! ;)
27 // garvin: default is to advance to the field-value parsing. Will only be set to true when a
28 // binary file is uploaded, thus bypassing further manipulation of $val.
30 $check_stop = false;
31 if (isset(${"fields_upload_" . $encoded_key}) && ${"fields_upload_" . $encoded_key} != 'none'){
32 // garvin: This fields content is a blob-file upload.
34 if (!empty(${"fields_upload_" . $encoded_key})) {
35 // garvin: The blob-field is not empty. Check what we have there.
37 $data_file = ${"fields_upload_" . $encoded_key};
39 if (is_uploaded_file($data_file)) {
40 // garvin: A valid uploaded file is found. Look into the file...
42 $val = fread(fopen($data_file, "rb"), filesize($data_file));
43 // nijel: This is probably the best way how to put binary data
44 // into MySQL and it also allow not to care about charset
45 // conversion that would otherwise corrupt the data.
47 if (!empty($val)) {
48 // garvin: The upload was valid. Check in new blob-field's contents.
49 $val = '0x' . bin2hex($val);
50 $seen_binary = TRUE;
51 $check_stop = TRUE;
53 // garvin: ELSE: an empty file was uploaded. Remove blob-field's contents.
54 // Blob-fields are preserved, see below. ($protected$)
56 } else {
57 // garvin: Danger, will robinson. File is malicious. Blob-fields are preserved, see below. ($protected$)
58 // void
61 } elseif (!empty(${'fields_uploadlocal_' . $encoded_key})) {
62 $file_to_upload = $cfg['UploadDir'] . eregi_replace('\.\.*', '.', ${'fields_uploadlocal_' . $encoded_key});
64 // A local file will be uploaded.
65 $open_basedir = '';
66 if (PMA_PHP_INT_VERSION >= 40000) {
67 $open_basedir = @ini_get('open_basedir');
69 if (empty($open_basedir)) {
70 $open_basedir = @get_cfg_var('open_basedir');
73 // If we are on a server with open_basedir, we must move the file
74 // before opening it. The doc explains how to create the "./tmp"
75 // directory
77 $unlink = false;
78 if (!empty($open_basedir)) {
80 $tmp_subdir = (PMA_IS_WINDOWS ? '.\\tmp\\' : './tmp/');
82 // function is_writeable() is valid on PHP3 and 4
83 if (!is_writeable($tmp_subdir)) {
84 // if we cannot move the file don't change blob fields
85 $file_to_upload = '';
86 } else {
87 $new_file_to_upload = $tmp_subdir . basename($file_to_upload);
88 if (PMA_PHP_INT_VERSION < 40003) {
89 copy($file_to_upload, $new_file_to_upload);
90 } else {
91 move_uploaded_file($file_to_upload, $new_file_to_upload);
94 $file_to_upload = $new_file_to_upload;
95 $unlink = true;
99 if ($file_to_upload != '') {
101 $val = fread(fopen($file_to_upload, "rb"), filesize($file_to_upload));
102 if (!empty($val)) {
103 $val = '0x' . bin2hex($val);
104 $seen_binary = TRUE;
105 $check_stop = TRUE;
108 if ($unlink == TRUE) {
109 unlink($file_to_upload);
114 // garvin: else: Post-field contains no data. Blob-fields are preserved, see below. ($protected$)
118 if (!$check_stop) {
119 // f i e l d v a l u e i n t h e f o r m
120 if (isset($fields_type[$encoded_key])) $type = $fields_type[$encoded_key];
121 else $type = '';
122 switch (strtolower($val)) {
123 case 'null':
124 break;
125 case '':
126 switch ($type) {
127 case 'enum':
128 // if we have an enum, then construct the value
129 $f = 'field_' . md5($key);
130 if (!empty($$f)) {
131 $val = implode(',', $$f);
132 if ($val == 'null') {
133 // void
134 } else {
135 // the data here is not urlencoded!
136 //$val = "'" . PMA_sqlAddslashes(urldecode($val)) . "'";
137 $val = "'" . PMA_sqlAddslashes($val) . "'";
139 } else {
140 $val = "''";
142 break;
143 case 'set':
144 // if we have a set, then construct the value
145 $f = 'field_' . md5($key);
146 if (!empty($$f)) {
147 $val = implode(',', $$f);
148 // the data here is not urlencoded!
149 //$val = "'" . PMA_sqlAddslashes(urldecode($val)) . "'";
150 $val = "'" . PMA_sqlAddslashes($val) . "'";
151 } else {
152 $val = "''";
154 break;
155 case 'foreign':
156 // if we have a foreign key, then construct the value
157 $f = 'field_' . md5($key);
158 if (!empty($$f)) {
159 $val = implode(',', $$f);
160 if ($val == 'null') {
161 // void
162 } else {
163 // the data here is not urlencoded!
164 //$val = "'" . PMA_sqlAddslashes(urldecode($val)) . "'";
165 $val = "'" . PMA_sqlAddslashes($val) . "'";
167 } else {
168 $val = "''";
170 break;
171 case 'protected':
172 // here we are in protected mode (asked in the config)
173 // so tbl_change has put this special value in the
174 // fields array, so we do not change the field value
175 // but we can still handle field upload
177 // garvin: when in UPDATE mode, do not alter field's contents. When in INSERT
178 // mode, insert empty field because no values were submitted. If protected
179 // blobs where set, insert original fields content.
180 if (isset($fieldlist)) {
181 if (isset($prot_row) && isset($prot_row[$key]) && !empty($prot_row[$key])) {
182 $val = '0x' . bin2hex($prot_row[$key]);
183 $seen_binary = TRUE;
184 } else {
185 $val = "''";
187 } else {
188 unset($val);
191 break;
192 default:
193 $val = "'" . PMA_sqlAddslashes($val) . "'";
194 break;
196 break;
197 default:
198 $val = "'" . PMA_sqlAddslashes($val) . "'";
199 break;
200 } // end switch
202 // Was the Null checkbox checked for this field?
203 // (if there is a value, we ignore the Null checkbox: this could
204 // be possible if Javascript is disabled in the browser)
205 if (isset($fields_null) && isset($fields_null[$encoded_key])
206 && $val=="''") {
207 $val = 'NULL';
209 } // end else (field value in the form)