XHTML fixes
[phpmyadmin/crack.git] / libraries / cleanup.lib.php
blob05ebe5d234d3bcb884c9dc3b61c422b4e4acdaee
1 <?php
2 /* vim: set expandtab sw=4 ts=4 sts=4: */
3 /**
4 * Functions for cleanup of user input.
6 * @version $Id$
7 */
9 /**
10 * Removes all variables from request except whitelisted ones.
12 * @param string list of variables to allow
13 * @return nothing
14 * @access public
15 * @author Michal Cihar (michal@cihar.com)
17 function PMA_remove_request_vars(&$whitelist)
19 // do not check only $_REQUEST because it could have been overwritten
20 // and use type casting because the variables could have become
21 // strings
22 $keys = array_keys(array_merge((array)$_REQUEST, (array)$_GET, (array)$_POST, (array)$_COOKIE));
24 foreach($keys as $key) {
25 if (! in_array($key, $whitelist)) {
26 unset($_REQUEST[$key], $_GET[$key], $_POST[$key], $GLOBALS[$key]);
27 } else {
28 // allowed stuff could be compromised so escape it
29 // we require it to be a string
30 if (isset($_REQUEST[$key]) && ! is_string($_REQUEST[$key])) {
31 unset($_REQUEST[$key]);
33 if (isset($_POST[$key]) && ! is_string($_POST[$key])) {
34 unset($_POST[$key]);
36 if (isset($_COOKIE[$key]) && ! is_string($_COOKIE[$key])) {
37 unset($_COOKIE[$key]);
39 if (isset($_GET[$key]) && ! is_string($_GET[$key])) {
40 unset($_GET[$key]);