防SQL注入

$_GET      = sql_injection_deal($_GET); 
$_POST        = sql_injection_deal($_POST);
$_COOKIE   = sql_injection_deal($_COOKIE);
function sql_injection_deal($arr){     
   if(get_magic_quotes_gpc()){ return $arr;}//php>6 以舍弃,必须自己转义
   foreach($arr as $k=>$v){
      if (is_string($v)){
         $arr[$k] = addslashes($v);
      }else if (is_array($v)) { 
         #  若为数组,则再转义.
             $arr[$k] = sql_injection_deal($v);
      }    
   } 
    return $arr;
}

猜你喜欢

转载自blog.csdn.net/qq_29065191/article/details/80090250