ID: 40097
User updated by: marcel dot normann at experimentierkasten dot de
Reported By: marcel dot normann at experimentierkasten dot de
Status: Wont fix
Bug Type: Feature/Change Request
Operating System: all
PHP Version: 6CVS-2007-01-11 (CVS)
New Comment:
Derick, you are right. But I have revised a lot of code from other
developers last months and I found SQL injections made possible by
unsecure use of implode() in almost every application. I think that
situation can be improved by offering a callback in implode().
Previous Comments:
------------------------------------------------------------------------
[2007-01-11 08:09:07] [EMAIL PROTECTED]
You can use array walk for that:
array_walk(implode('-', $string), 'callbackFunc');
------------------------------------------------------------------------
[2007-01-11 07:44:07] marcel dot normann at experimentierkasten dot de
Description:
------------
implode() is often used for doing such things like
$sSql = "select * from somewhere where something in
('".implode("','",$aArray)."')";
This is nice for SQL injection. Maybe it would be a good idea to add a
possibility to implode() for manipulating each implode()-item:
string implode ( string glue, array pieces [, callback callback])
$aArray = array('some','boring','items');
echo implode('-',$aArray,'ucfirst'); // = Some-Boring-Items
This example is not very usefull but imgine the use of
mysql_escape_string() instead.
------------------------------------------------------------------------
--
Edit this bug report at http://bugs.php.net/?id=40097&edit=1