Escape $_POST vars with mysql_real_escape_string() to prevent sql

injection attacks.
This commit is contained in:
Stefan Pflüger
2005-01-02 17:00:04 +00:00
committed by WineHQ
parent 72150edc80
commit ae3b27acf6

View File

@@ -17,10 +17,14 @@ $categoryId = "any"; /* default to all categories */
/* process the post variables to override the default settings */
if($_POST)
{
if(isset($_POST['topNumber'])) $topNumber = $_POST['topNumber'];
if(isset($_POST['categoryId'])) $categoryId = $_POST['categoryId'];
if(isset($_POST['topNumber'])) $topNumber = (int)mysql_real_escape_string($_POST['topNumber']);
if(isset($_POST['categoryId'])) $categoryId = mysql_real_escape_string($_POST['categoryId']);
}
/* Check if the value makes sense */
if(!is_integer($topNumber) || $topNumber > 200 || $topNumber < 1)
$topNumber = 25;
apidb_header("Vote Stats - Top $topNumber Applications");
/* display the selection for the top number of apps to view */