';
$this->message('Error Reporting', $table, 1);
}
// ###################################################################
/**
* Logs a debug message for verbose output
*
* @access public
*
* @param string Message
*/
function debug($message)
{
$this->debuginfo[] = $message;
}
// ###################################################################
/**
* Recursive XSS cleaner
*
* @access private
*
* @param mixed Unsanitized REQUEST data
*
* @return mixed Sanitized data
*/
function _sanitize_input_recursive($data)
{
foreach ($data AS $key => $value)
{
if (is_array($value))
{
$data["$key"] = $this->_sanitize_input_recursive($value);
}
else
{
$data["$key"] = $this->sanitize($value);
}
}
return $data;
}
// ###################################################################
/**
* Simple way to protect against HTML attacks with Unicode support
*
* @access public
*
* @param string Unsanitzed text
*
* @return string Properly protected text that only encodes potential threats
*/
function sanitize($text)
{
if ($this->magicquotes)
{
return str_replace(array('<', '>', '\"', '"'), array('<', '>', '"', '"'), $text);
}
else
{
return str_replace(array('<', '>', '"'), array('<', '>', '"'), $text);
}
}
// ###################################################################
/**
* Unicode-safe entity encoding system; similar to sanitize()
*
* @access public
*
* @param string Unsanitized text
*
* @return string Unicode-safe sanitized text with entities preserved
*/
function entity_encode($text)
{
$text = str_replace('&', '&', $text);
$text = $this->sanitize($text);
return $text;
}
// ###################################################################
/**
* Takes text that has been processed for HTML and unsanitizes it
*
* @access public
*
* @param string Text that needs to be turned back into HTML
*
* @return string Unsanitized text
*/
function unsanitize($text)
{
return str_replace(array('<', '>', '"'), array('<', '>', '"'), $text);
}
// ###################################################################
/**
* Smart addslashes() that only applies itself it the Magic Quotes GPC
* is off. This should only be run on database query values.
*
* @access public
*
* @param string Some string
* @param bool If the data is binary; if so it'll be run through DB::escape_stringing()
* @param bool Force magic quotes to be off
*
* @return string String that has slashes added
*/
function escape($str, $binary = false, $force = true)
{
if ($this->magicquotes AND !$force)
{
if (isset($this->modules[ISSO_DB_LAYER]) AND $binary)
{
return $this->modules[ISSO_DB_LAYER]->escape_string(str_replace(array("\'", '\"'), array("'", '"'), $str));
}
return $str;
}
else
{
if (isset($this->modules[ISSO_DB_LAYER]) AND $binary)
{
return $this->modules[ISSO_DB_LAYER]->escape_string($str);
}
return addslashes($str);
}
}
// ###################################################################
/**
* Runs through all of the input data and sanitizes it.
*
* @access private
*/
function exec_sanitize_data()
{
$this->in = $this->_sanitize_input_recursive(array_merge($_GET, $_POST, $_COOKIE));
}
// ###################################################################
/**
* Sanitize function for something other than a string (which
* everything is sanitized for if you use exec_sanitize_data(). Cleaned
* data is placed back into $isso->in; this makes it so you don't have
* to constantly intval() [etc.] data.
*
* @access public
*
* @param array Array of elements to clean as varname => type
*/
function input_clean_array($vars)
{
foreach ($vars AS $varname => $type)
{
$this->input_clean($varname, $type);
}
}
// ###################################################################
/**
* Sanitize function that does a single variable as oppoesd to an array
* (see input_clean_array() for more details)
*
* @access public
*
* @param string Variable name in $isso->in[]
* @param integer Sanitization type constant
*/
function input_clean($varname, $type)
{
if (isset($this->in["$varname"]))
{
$this->in["$varname"] = $this->clean($this->in["$varname"], $type);
}
else
{
$this->in["$varname"] = null;
}
return $this->in["$varname"];
}
// ###################################################################
/**
* Cleaning function that does the work for input_clean(); this is
* moved here so it can be used to clean things that aren't in
* $isso->in[]
*
* @access public
*
* @param mixed Data
* @param integer Sanitization type constant
*
* @return mixed Cleaned data
*/
function clean($value, $type)
{
if ($type == TYPE_INT)
{
$value = intval($value);
}
else if ($type == TYPE_UINT)
{
$value = abs(intval($value));
}
else if ($type == TYPE_FLOAT)
{
$value = floatval($value);
}
else if ($type == TYPE_BOOL)
{
$value = (bool)$value;
}
else if ($type == TYPE_STR)
{
$value = $value;
}
else if ($type == TYPE_STRUN)
{
$value = $this->unsanitize($value);
}
else if ($type == TYPE_NOCLEAN)
{
$value = $value;
}
else
{
trigger_error('Invalid clean type `' . $type . '` specified', E_USER_ERROR);
}
return $value;
}
// ###################################################################
/**
* Checks to see if a POST refer is actually from us
*
* @access public
*/
function exec_referer_check()
{
if ($_SERVER['REQUEST_METHOD'] == 'POST')
{
$host = ($_SERVER['HTTP_HOST']) ? $_SERVER['HTTP_HOST'] : $_ENV['HTTP_HOST'];
if ($host AND $_SERVER['HTTP_REFERER'])
{
$parts = parse_url($_SERVER['HTTP_REFERER']);
$ourhost = $parts['host'] . (isset($parts['port']) ? ":$parts[port]" : '');
if ($ourhost != $host)
{
trigger_error('No external hosts are allowed to POST to this application', E_USER_ERROR);
}
$this->debug('remote post check = ok');
}
else
{
$this->debug('remote post check = FAILED');
}
}
}
// ###################################################################
/**
* Constructs a debug information box that contains various debugging
* information points
*
* @access public
*
* @param bool Show template information?
*
* @return string Debugging block
*/
function construct_debug_block($dotemplates)
{
$debug = '';
if ($this->debug)
{
$debug = "\n