Changeset 42056 for trunk/src/wp-includes/wp-db.php
- Timestamp:
- 10/31/2017 11:59:43 AM (7 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/wp-includes/wp-db.php
r41828 r42056 1107 1107 if ( $this->dbh ) { 1108 1108 if ( $this->use_mysqli ) { 1109 returnmysqli_real_escape_string( $this->dbh, $string );1109 $escaped = mysqli_real_escape_string( $this->dbh, $string ); 1110 1110 } else { 1111 return mysql_real_escape_string( $string, $this->dbh ); 1112 } 1113 } 1114 1115 $class = get_class( $this ); 1116 if ( function_exists( '__' ) ) { 1117 /* translators: %s: database access abstraction class, usually wpdb or a class extending wpdb */ 1118 _doing_it_wrong( $class, sprintf( __( '%s must set a database connection for use with escaping.' ), $class ), '3.6.0' ); 1111 $escaped = mysql_real_escape_string( $string, $this->dbh ); 1112 } 1119 1113 } else { 1120 _doing_it_wrong( $class, sprintf( '%s must set a database connection for use with escaping.', $class ), '3.6.0' ); 1121 } 1122 return addslashes( $string ); 1114 $class = get_class( $this ); 1115 if ( function_exists( '__' ) ) { 1116 /* translators: %s: database access abstraction class, usually wpdb or a class extending wpdb */ 1117 _doing_it_wrong( $class, sprintf( __( '%s must set a database connection for use with escaping.' ), $class ), '3.6.0' ); 1118 } else { 1119 _doing_it_wrong( $class, sprintf( '%s must set a database connection for use with escaping.', $class ), '3.6.0' ); 1120 } 1121 $escaped = addslashes( $string ); 1122 } 1123 1124 return $this->add_placeholder_escape( $escaped ); 1123 1125 } 1124 1126 … … 1202 1204 * All placeholders MUST be left unquoted in the query string. A corresponding argument MUST be passed for each placeholder. 1203 1205 * 1206 * For compatibility with old behavior, numbered or formatted string placeholders (eg, %1$s, %5s) will not have quotes 1207 * added by this function, so should be passed with appropriate quotes around them for your usage. 1208 * 1204 1209 * Literal percentage signs (%) in the query string must be written as %%. Percentage wildcards (for example, 1205 1210 * to use in LIKE syntax) must be passed via a substitution argument containing the complete LIKE string, these 1206 1211 * cannot be inserted directly in the query string. Also see {@see esc_like()}. 1207 1212 * 1208 * This method DOES NOT support sign, padding, alignment, width or precision specifiers. 1209 * This method DOES NOT support argument numbering or swapping. 1210 * 1211 * Arguments may be passed as individual arguments to the method, or as a single array containing all arguments. A combination 1213 * Arguments may be passed as individual arguments to the method, or as a single array containing all arguments. A combination 1212 1214 * of the two is not supported. 1213 1215 * … … 1226 1228 */ 1227 1229 public function prepare( $query, $args ) { 1228 if ( is_null( $query ) ) 1230 if ( is_null( $query ) ) { 1229 1231 return; 1232 } 1230 1233 1231 1234 // This is not meant to be foolproof -- but it will catch obviously incorrect usage. … … 1238 1241 array_shift( $args ); 1239 1242 1240 // If args were passed as an array (as in vsprintf), move them up 1243 // If args were passed as an array (as in vsprintf), move them up. 1244 $passed_as_array = false; 1241 1245 if ( is_array( $args[0] ) && count( $args ) == 1 ) { 1246 $passed_as_array = true; 1242 1247 $args = $args[0]; 1243 1248 } … … 1250 1255 } 1251 1256 1252 $query = str_replace( "'%s'", '%s', $query ); // in case someone mistakenly already singlequoted it 1253 $query = str_replace( '"%s"', '%s', $query ); // doublequote unquoting 1254 $query = preg_replace( '|(?<!%)%f|' , '%F', $query ); // Force floats to be locale unaware 1255 $query = preg_replace( '|(?<!%)%s|', "'%s'", $query ); // quote the strings, avoiding escaped strings like %%s 1256 $query = preg_replace( '/%(?:%|$|([^dsF]))/', '%%\\1', $query ); // escape any unescaped percents 1257 1258 // Count the number of valid placeholders in the query 1259 $placeholders = preg_match_all( '/(^|[^%]|(%%)+)%[sdF]/', $query, $matches ); 1260 1261 if ( count ( $args ) !== $placeholders ) { 1262 wp_load_translations_early(); 1263 _doing_it_wrong( 'wpdb::prepare', 1264 /* translators: 1: number of placeholders, 2: number of arguments passed */ 1265 sprintf( __( 'The query does not contain the correct number of placeholders (%1$d) for the number of arguments passed (%2$d).' ), 1266 $placeholders, 1267 count( $args ) ), 1268 '4.9.0' 1269 ); 1257 /* 1258 * Specify the formatting allowed in a placeholder. The following are allowed: 1259 * 1260 * - Sign specifier. eg, $+d 1261 * - Numbered placeholders. eg, %1$s 1262 * - Padding specifier, including custom padding characters. eg, %05s, %'#5s 1263 * - Alignment specifier. eg, %05-s 1264 * - Precision specifier. eg, %.2f 1265 */ 1266 $allowed_format = '(?:[1-9][0-9]*[$])?[-+0-9]*(?: |0|\'.)?[-+0-9]*(?:\.[0-9]+)?'; 1267 1268 /* 1269 * If a %s placeholder already has quotes around it, removing the existing quotes and re-inserting them 1270 * ensures the quotes are consistent. 1271 * 1272 * For backwards compatibility, this is only applied to %s, and not to placeholders like %1$s, which are frequently 1273 * used in the middle of longer strings, or as table name placeholders. 1274 */ 1275 $query = str_replace( "'%s'", '%s', $query ); // Strip any existing single quotes. 1276 $query = str_replace( '"%s"', '%s', $query ); // Strip any existing double quotes. 1277 $query = preg_replace( '/(?<!%)%s/', "'%s'", $query ); // Quote the strings, avoiding escaped strings like %%s. 1278 1279 $query = preg_replace( "/(?<!%)(%($allowed_format)?f)/" , '%\\2F', $query ); // Force floats to be locale unaware. 1280 1281 $query = preg_replace( "/%(?:%|$|(?!($allowed_format)?[sdF]))/", '%%\\1', $query ); // Escape any unescaped percents. 1282 1283 // Count the number of valid placeholders in the query. 1284 $placeholders = preg_match_all( "/(^|[^%]|(%%)+)%($allowed_format)?[sdF]/", $query, $matches ); 1285 1286 if ( count( $args ) !== $placeholders ) { 1287 if ( 1 === $placeholders && $passed_as_array ) { 1288 // If the passed query only expected one argument, but the wrong number of arguments were sent as an array, bail. 1289 wp_load_translations_early(); 1290 _doing_it_wrong( 'wpdb::prepare', __( 'The query only expected one placeholder, but an array of multiple placeholders was sent.' ), '4.9.0' ); 1291 1292 return; 1293 } else { 1294 /* 1295 * If we don't have the right number of placeholders, but they were passed as individual arguments, 1296 * or we were expecting multiple arguments in an array, throw a warning. 1297 */ 1298 wp_load_translations_early(); 1299 _doing_it_wrong( 'wpdb::prepare', 1300 /* translators: 1: number of placeholders, 2: number of arguments passed */ 1301 sprintf( __( 'The query does not contain the correct number of placeholders (%1$d) for the number of arguments passed (%2$d).' ), 1302 $placeholders, 1303 count( $args ) ), 1304 '4.8.3' 1305 ); 1306 } 1270 1307 } 1271 1308 1272 1309 array_walk( $args, array( $this, 'escape_by_ref' ) ); 1273 return @vsprintf( $query, $args ); 1310 $query = @vsprintf( $query, $args ); 1311 1312 return $this->add_placeholder_escape( $query ); 1274 1313 } 1275 1314 … … 1892 1931 $this->queries[] = array( $query, $this->timer_stop(), $this->get_caller() ); 1893 1932 } 1933 } 1934 1935 /** 1936 * Generates and returns a placeholder escape string for use in queries returned by ::prepare(). 1937 * 1938 * @since 4.8.3 1939 * 1940 * @return string String to escape placeholders. 1941 */ 1942 public function placeholder_escape() { 1943 static $placeholder; 1944 1945 if ( ! $placeholder ) { 1946 // If ext/hash is not present, compat.php's hash_hmac() does not support sha256. 1947 $algo = function_exists( 'hash' ) ? 'sha256' : 'sha1'; 1948 // Old WP installs may not have AUTH_SALT defined. 1949 $salt = defined( 'AUTH_SALT' ) ? AUTH_SALT : rand(); 1950 1951 $placeholder = '{' . hash_hmac( $algo, uniqid( $salt, true ), $salt ) . '}'; 1952 } 1953 1954 /* 1955 * Add the filter to remove the placeholder escaper. Uses priority 0, so that anything 1956 * else attached to this filter will recieve the query with the placeholder string removed. 1957 */ 1958 if ( ! has_filter( 'query', array( $this, 'remove_placeholder_escape' ) ) ) { 1959 add_filter( 'query', array( $this, 'remove_placeholder_escape' ), 0 ); 1960 } 1961 1962 return $placeholder; 1963 } 1964 1965 /** 1966 * Adds a placeholder escape string, to escape anything that resembles a printf() placeholder. 1967 * 1968 * @since 4.8.3 1969 * 1970 * @param string $query The query to escape. 1971 * @return string The query with the placeholder escape string inserted where necessary. 1972 */ 1973 public function add_placeholder_escape( $query ) { 1974 /* 1975 * To prevent returning anything that even vaguely resembles a placeholder, 1976 * we clobber every % we can find. 1977 */ 1978 return str_replace( '%', $this->placeholder_escape(), $query ); 1979 } 1980 1981 /** 1982 * Removes the placeholder escape strings from a query. 1983 * 1984 * @since 4.8.3 1985 * 1986 * @param string $query The query from which the placeholder will be removed. 1987 * @return string The query with the placeholder removed. 1988 */ 1989 public function remove_placeholder_escape( $query ) { 1990 return str_replace( $this->placeholder_escape(), '%', $query ); 1894 1991 } 1895 1992 … … 2065 2162 2066 2163 $sql = "UPDATE `$table` SET $fields WHERE $conditions"; 2067 2164 2068 2165 $this->check_current_query = false; 2069 2166 return $this->query( $this->prepare( $sql, $values ) );
Note: See TracChangeset
for help on using the changeset viewer.