/phpMyAdmin/libraries/tbl_replace_fields.inc.php
PHP | 111 lines | 59 code | 11 blank | 41 comment | 35 complexity | 368d48a1cd84ab4b656dcc3df8e875d7 MD5 | raw file
Possible License(s): LGPL-3.0, LGPL-2.0, JSON, GPL-2.0, BSD-3-Clause, LGPL-2.1, MIT
- <?php
- /* vim: set expandtab sw=4 ts=4 sts=4: */
- /**
- * handle field values (possibly uploaded from a file)
- *
- * original if-clause checked, whether input was stored in a possible
- * fields_upload_XX var. Now check, if the field is set. If it is empty or a
- * malicious file, do not alter fields contents. If an empty or invalid file is
- * specified, the binary data gets deleter. Maybe a nice new text-variable is
- * appropriate to document this behaviour.
- *
- * security cautions! You could trick the form and submit any file the
- * webserver has access to for upload to a binary field. Shouldn't be that easy! ;)
- *
- * default is to advance to the field-value parsing. Will only be set to
- * true when a binary file is uploaded, thus bypassing further manipulation of $val.
- *
- * note: grab_globals has extracted the fields from _FILES or HTTP_POST_FILES
- *
- *
- * @package PhpMyAdmin
- */
- if (! defined('PHPMYADMIN')) {
- exit;
- }
- /**
- * do not import request variable into global scope
- */
- if (! defined('PMA_NO_VARIABLES_IMPORT')) {
- define('PMA_NO_VARIABLES_IMPORT', true);
- }
- /**
- * Gets some core libraries
- */
- require_once './libraries/common.inc.php';
- require_once './libraries/File.class.php';
- $file_to_insert = new PMA_File();
- $file_to_insert->checkTblChangeForm($key, $rownumber);
- $possibly_uploaded_val = $file_to_insert->getContent();
- if ($file_to_insert->isError()) {
- $message .= $file_to_insert->getError();
- }
- $file_to_insert->cleanUp();
- if (false !== $possibly_uploaded_val) {
- $val = $possibly_uploaded_val;
- } else {
- // f i e l d v a l u e i n t h e f o r m
- if (isset($me_fields_type[$key])) {
- $type = $me_fields_type[$key];
- } else {
- $type = '';
- }
- // $key contains the md5() of the fieldname
- if ($type != 'protected' && $type != 'set' && 0 === strlen($val)) {
- // best way to avoid problems in strict mode (works also in non-strict mode)
- if (isset($me_auto_increment) && isset($me_auto_increment[$key])) {
- $val = 'NULL';
- } else {
- $val = "''";
- }
- } elseif ($type == 'set') {
- if (! empty($_REQUEST['fields']['multi_edit'][$rownumber][$key])) {
- $val = implode(',', $_REQUEST['fields']['multi_edit'][$rownumber][$key]);
- $val = "'" . PMA_sqlAddSlashes($val) . "'";
- } else {
- $val = "''";
- }
- } elseif ($type == 'protected') {
- // here we are in protected mode (asked in the config)
- // so tbl_change has put this special value in the
- // fields array, so we do not change the field value
- // but we can still handle field upload
- // when in UPDATE mode, do not alter field's contents. When in INSERT
- // mode, insert empty field because no values were submitted. If protected
- // blobs where set, insert original fields content.
- if (! empty($prot_row[$me_fields_name[$key]])) {
- $val = '0x' . bin2hex($prot_row[$me_fields_name[$key]]);
- } else {
- $val = '';
- }
- } elseif ($type == 'bit') {
- $val = preg_replace('/[^01]/', '0', $val);
- $val = "b'" . PMA_sqlAddSlashes($val) . "'";
- } elseif (! (($type == 'datetime' || $type == 'timestamp') && $val == 'CURRENT_TIMESTAMP')) {
- $val = "'" . PMA_sqlAddSlashes($val) . "'";
- }
- // Was the Null checkbox checked for this field?
- // (if there is a value, we ignore the Null checkbox: this could
- // be possible if Javascript is disabled in the browser)
- if (! empty($me_fields_null[$key])
- && ($val == "''" || $val == '')) {
- $val = 'NULL';
- }
- // The Null checkbox was unchecked for this field
- if (empty($val) && ! empty($me_fields_null_prev[$key]) && ! isset($me_fields_null[$key])) {
- $val = "''";
- }
- } // end else (field value in the form)
- unset($type);
- ?>