PHP Classes

User Input Sanitation: Escape values of request variables

Recommend this page to a friend!
  Info   View files View files (2)   DownloadInstall with Composer Download .zip   Reputation   Support forum (2)   Blog    
Ratings Unique User Downloads Download Rankings
StarStarStar 40%Total: 1,383 This week: 1All time: 2,811 This week: 560Up
Version License PHP version Categories
sanitize 1.0GNU General Publi...3.0HTTP, Text processing
Description 

Author

This class can be used to escape values of request variables.

It traverses the arrays of request super-global variables $_GET, $_POST, $_REQUEST and $_COOKIE.

The class escapes the values of the request variables add escape slashes characters to quotes, backslashes and NUL characters, so the values can be used in database queries without further escaping.

As I have closely watched PHPClasses for a long time now, I must say that I never saw a class which is simple yet very effective in sanitizing user input which is a major security concern for every web application. I have used simple logic and methods to clean malicious input and make database interaction a bit safer.

Picture of nirmit
Name: nirmit <contact>
Classes: 1 package by
Country: India India
Age: ???
All time rank: 1942119 in India India
Week rank: 411 Up26 in India India Up

  Files folder image Files  
File Role Description
Plain text file class.sanitize.php Class This is the class file which does all the sanitation work.
Accessible without login Plain text file example.php Example This is a working example of the class

 Version Control Unique User Downloads Download Rankings  
 0%
Total:1,383
This week:1
All time:2,811
This week:560Up
User Ratings User Comments (2)
 All time
Utility:56%StarStarStar
Consistency:56%StarStarStar
Documentation:-
Examples:62%StarStarStarStar
Tests:-
Videos:-
Overall:40%StarStarStar
Rank:3763
 
A little outdated, though not to bad in terms of formatting a...
13 years ago (Jason Hopkins)
57%StarStarStar
This is a poor class.
16 years ago (Nikolaj)
5%Star