downloads | documentation | faq | getting help | mailing lists | licenses | wiki | reporting bugs | sites | links | conferences | my

search for in the

What are Magic Quotes> <User Submitted Data
[edit] Last updated: Fri, 22 Jul 2011

view this page in

Magic Quotes

Table of Contents


This feature has been DEPRECATED as of PHP 5.3.0. Relying on this feature is highly discouraged.

Magic Quotes is a process that automagically escapes incoming data to the PHP script. It's preferred to code with magic quotes off and to instead escape the data at runtime, as needed.

What are Magic Quotes> <User Submitted Data
[edit] Last updated: Fri, 22 Jul 2011
add a note add a note User Contributed Notes Magic Quotes
NanoCaiordo 25-Apr-2011 03:22
Magic Quotes are depreciated and going to be removed in PHP6.
If you still want your code to be portable, no warnings etc, as of PHP52 you can use the following code.

foreach ($_GET as $key => &$val) $val = filter_input(INPUT_GET, $key);

foreach (
$_POST as $key => &$val) $val = filter_input(INPUT_POST, $key);

The above will retrieve an-escaped GETs and POSTs regardless system settings. It can also be used for $_COOKIES and others.
cHao 14-Mar-2011 04:38
The very reason magic quotes are deprecated is that a one-size-fits-all approach to escaping/quoting is wrongheaded and downright dangerous.  Different types of content have different special chars and different ways of escaping them, and what works in one tends to have side effects elsewhere.  Any sample code, here or anywhere else, that pretends to work like magic quotes --or does a similar conversion for HTML, SQL, or anything else for that matter -- is similarly wrongheaded and similarly dangerous.

Magic quotes are not for security.  They never have been.  It's a convenience thing -- they exist so a PHP noob can fumble along and eventually write some mysql queries that kinda work, without having to learn about escaping/quoting data properly.  They prevent a few accidental syntax errors, as is their job.  But they won't stop a malicious and semi-knowledgeable attacker from trashing the PHP noob's database.  And that poor noob may never even know how or why his database is now gone, because magic quotes (or his spiffy "i'm gonna escape everything" function) gave him a false sense of security.  He never had to learn how to really handle untrusted input.

Data should be escaped where you need it escaped, and for the domain in which it will be used.  (mysql_real_escape_string -- NOT addslashes! -- for MySQL (and that's only unless you have a clue and use prepared statements), htmlentities or htmlspecialchars for HTML, etc.)  Anything else is doomed to failure.
shazdeh1358 at yahoo dot com 29-Jan-2011 01:41
for those who want an automatic sanitization of GET, POST, COOKIE, etc variables:

the code escapes ALL vars! That is, it effectively prevents SQL injection and XSS attaks. It lifts the need for 'magic_quotes_gpc = On' directive.

However it treats all variables as text and does not do type-cheking. So it is suitable only for making SQL queries or displaying html content.

the following code can be included in all pages which need html and sql sanitization.


// escaping and slashing all POST and GET variables. you may add $_COOKIE and $_REQUEST if you want them sanitized.
array_walk_recursive($_POST, 'sanitizeVariables');
array_walk_recursive($_GET, 'sanitizeVariables');

// sanitization
function sanitizeVariables(&$item, $key)
    if (!
// undoing 'magic_quotes_gpc = On' directive
if (get_magic_quotes_gpc())
$item = stripcslashes($item);
$item = sanitizeText($item);

// does the actual 'html' and 'sql' sanitization. customize if you want.
function sanitizeText($text)
$text = str_replace("<", "&lt;", $text);
$text = str_replace(">", "&gt;", $text);
$text = str_replace("\"", "&quot;", $text);
$text = str_replace("'", "&#039;", $text);
// it is recommended to replace 'addslashes' with 'mysql_real_escape_string' or whatever db specific fucntion used for escaping. However 'mysql_real_escape_string' is slower because it has to connect to mysql.
$text = addslashes($text);


// export POST variables as GLOBALS. remove if you want
foreach (array_keys($_POST) as $ehsanKey)
$GLOBALS[$ehsanKey] = $_POST[$ehsanKey];

// export GET variables as GLOBALS. remove if you want
foreach (array_keys($_GET) as $ehsanKey)
$GLOBALS[$ehsanKey] = $_GET[$ehsanKey];

// preventing the key used above for iteration from getting into globals (in case  'register_globals = On')

// the reverse function of 'sanitizeText'. you may use it in pages which need the original data (e.g. for an HTML editor)
function unsanitizeText($text)
$text stripcslashes($text);

$text = str_replace("&#039;", "'", $text);
$text = str_replace("&gt;", ">", $text);
$text = str_replace("&quot;", "\"", $text);   
$text = str_replace("&lt;", "<", $text);

show source | credits | sitemap | contact | advertising | mirror sites