Security Filter for Request HTTP Data

Security Filter for Request HTTP Data
Filter dangerous values from request variables
HTTP, Security
Roman Shneer
This class can be used to filter dangerous values from request variables.

It can traverse the $_GET, $_POST, $_REQUEST and $_COOKIE request super-global array variables and reset the entries that match certain regular expressions that identify potential dangerous values.

Currently filter values that contain SQL retrieval queries, cross-site scripting attacks, hexadecimal values, calls to base64_decode and system functions.


This entry was posted on Tuesday, May 26th, 2009 at 9:43 pm
Entry is filed under Uncategorized.
Read original posting here.
You can follow any responses to this entry through the RSS 2.0 feed.

Both comments and pings are currently closed. Total Views: 266

Comments are closed.