Revert "[SECURITY] Fix OS command injection."

This commit is contained in:
Serghey Rodin 2015-12-11 21:14:49 +02:00
commit 39e9b6397b
115 changed files with 1980 additions and 1340 deletions

View file

@ -9,9 +9,9 @@ include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
// Check query
$q = $_GET['q'];
if (empty($q)) {
$back = getenv('HTTP_REFERER');
$back=getenv("HTTP_REFERER");
if (!empty($back)) {
header("Location: $back");
header("Location: ".$back);
exit;
}
header("Location: /");
@ -29,12 +29,13 @@ $lang = 'ru_RU.utf8';
// Data
if ($_SESSION['user'] == 'admin') {
v_exec('v-search-object', [$q, 'json'], false, $output);
$data = json_decode($output, true);
$q = escapeshellarg($q);
exec (VESTA_CMD."v-search-object ".$q." json", $output, $return_var);
$data = json_decode(implode('', $output), true);
include($_SERVER['DOCUMENT_ROOT'].'/templates/admin/list_search.html');
} else {
v_exec('v-search-user-object', [$user, $q, 'json'], false, $output);
$data = json_decode($output, true);
exec (VESTA_CMD."v-search-user-object ".$user." ".$q." json", $output, $return_var);
$data = json_decode(implode('', $output), true);
include($_SERVER['DOCUMENT_ROOT'].'/templates/user/list_search.html');
}