summaryrefslogtreecommitdiffstats
path: root/web/lib/acctfuncs.inc
diff options
context:
space:
mode:
authorDan McGee <dan@archlinux.org>2011-04-26 06:23:01 +0200
committerLukas Fleischer <archlinux@cryptocrack.de>2011-04-27 14:50:27 +0200
commit3609cf140eaca30878d0a69fba0d837b4fec41a0 (patch)
tree5132be13c5b5afb70c7d281c6220f9fb5cbbcf2a /web/lib/acctfuncs.inc
parentfcda6671f3021273844f7898c7cfec1e99df8ec2 (diff)
downloadaur-3609cf140eaca30878d0a69fba0d837b4fec41a0.tar.gz
aur-3609cf140eaca30878d0a69fba0d837b4fec41a0.tar.xz
SQL: treat all UID/ID values as numbers, not strings
Ensure we are not quoting these values in any of our SQL queries. Thanks-to: elij <elij.mx@gmail.com> Signed-off-by: Dan McGee <dan@archlinux.org> Signed-off-by: Lukas Fleischer <archlinux@cryptocrack.de>
Diffstat (limited to 'web/lib/acctfuncs.inc')
-rw-r--r--web/lib/acctfuncs.inc18
1 files changed, 9 insertions, 9 deletions
diff --git a/web/lib/acctfuncs.inc b/web/lib/acctfuncs.inc
index 8e2ecb33..8ffa2f71 100644
--- a/web/lib/acctfuncs.inc
+++ b/web/lib/acctfuncs.inc
@@ -619,18 +619,18 @@ function try_login() {
# last ($MAX_SESSIONS_PER_USER - 1).
$q = "DELETE s.* FROM Sessions s ";
$q.= "LEFT JOIN (SELECT SessionID FROM Sessions ";
- $q.= "WHERE UsersId = '" . $userID . "' ";
+ $q.= "WHERE UsersId = " . $userID . " ";
$q.= "ORDER BY LastUpdateTS DESC ";
$q.= "LIMIT " . ($MAX_SESSIONS_PER_USER - 1) . ") q ";
$q.= "ON s.SessionID = q.SessionID ";
- $q.= "WHERE s.UsersId = '" . $userID . "' ";
+ $q.= "WHERE s.UsersId = " . $userID . " ";
$q.= "AND q.SessionID IS NULL;";
db_query($q, $dbh);
}
$new_sid = new_sid();
$q = "INSERT INTO Sessions (UsersID, SessionID, LastUpdateTS)"
- ." VALUES ( $userID, '" . $new_sid . "', UNIX_TIMESTAMP())";
+ ." VALUES (" . $userID . ", '" . $new_sid . "', UNIX_TIMESTAMP())";
$result = db_query($q, $dbh);
# Query will fail if $new_sid is not unique
@@ -749,7 +749,7 @@ function valid_passwd( $userID, $passwd )
if ($salt) {
# use salt
$passwd_q = "SELECT ID FROM Users" .
- " WHERE ID = '$userID' AND Passwd = '" .
+ " WHERE ID = " . $userID . " AND Passwd = '" .
salted_hash($passwd, $salt) . "'";
$passwd_result = mysql_fetch_row(db_query($passwd_q, $dbh));
if ($passwd_result[0]) {
@@ -758,14 +758,14 @@ function valid_passwd( $userID, $passwd )
} else {
# check without salt
$nosalt_q = "SELECT ID FROM Users".
- " WHERE ID = '$userID'" .
+ " WHERE ID = " . $userID .
" AND Passwd = '" . md5($passwd) . "'";
$nosalt_result = mysql_fetch_row(db_query($nosalt_q, $dbh));
if ($nosalt_result[0]) {
# password correct, but salt it first
if (!save_salt($userID, $passwd)) {
trigger_error("Unable to salt user's password;" .
- " ID $userID", E_USER_WARNING);
+ " ID " . $userID, E_USER_WARNING);
return false;
}
@@ -782,7 +782,7 @@ function valid_passwd( $userID, $passwd )
function user_suspended( $id )
{
$dbh = db_connect();
- $q = "SELECT Suspended FROM Users WHERE ID = '$id'";
+ $q = "SELECT Suspended FROM Users WHERE ID = " . $id;
$result = mysql_fetch_row(db_query($q, $dbh));
if ($result[0] == 1 ) {
return true;
@@ -796,7 +796,7 @@ function user_suspended( $id )
function user_delete( $id )
{
$dbh = db_connect();
- $q = "DELETE FROM Users WHERE ID = '$id'";
+ $q = "DELETE FROM Users WHERE ID = " . $id;
$result = mysql_fetch_row(db_query($q, $dbh));
return;
}
@@ -808,7 +808,7 @@ function user_delete( $id )
function user_is_privileged( $id )
{
$dbh = db_connect();
- $q = "SELECT AccountTypeID FROM Users WHERE ID = '$id'";
+ $q = "SELECT AccountTypeID FROM Users WHERE ID = " . $id;
$result = mysql_fetch_row(db_query($q, $dbh));
if( $result[0] > 1) {
return $result[0];