????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 18.116.85.79 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/phpmyadmin/libraries/ |
Upload File : |
<?php /* vim: set expandtab sw=4 ts=4 sts=4: */ /** * Get user's global privileges and some db-specific privileges * * @package PhpMyAdmin */ if (! defined('PHPMYADMIN')) { exit; } /** * */ $GLOBALS['is_superuser'] = PMA_isSuperuser(); /** * sets privilege information extracted from SHOW GRANTS result * * Detection for some CREATE privilege. * * Since MySQL 4.1.2, we can easily detect current user's grants using $userlink * (no control user needed) and we don't have to try any other method for * detection * * @todo fix to get really all privileges, not only explicitly defined for this user * from MySQL manual: (http://dev.mysql.com/doc/refman/5.0/en/show-grants.html) * SHOW GRANTS displays only the privileges granted explicitly to the named * account. Other privileges might be available to the account, but they are not * displayed. For example, if an anonymous account exists, the named account * might be able to use its privileges, but SHOW GRANTS will not display them. * * @return void */ function PMA_analyseShowGrant() { if (PMA_Util::cacheExists('is_create_db_priv', true)) { $GLOBALS['is_create_db_priv'] = PMA_Util::cacheGet('is_create_db_priv', true); $GLOBALS['is_process_priv'] = PMA_Util::cacheGet('is_process_priv', true); $GLOBALS['is_reload_priv'] = PMA_Util::cacheGet('is_reload_priv', true); $GLOBALS['db_to_create'] = PMA_Util::cacheGet('db_to_create', true); $GLOBALS['dbs_where_create_table_allowed'] = PMA_Util::cacheGet('dbs_where_create_table_allowed', true); return; } // defaults $GLOBALS['is_create_db_priv'] = false; $GLOBALS['is_process_priv'] = true; $GLOBALS['is_reload_priv'] = false; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'] = array(); $rs_usr = PMA_DBI_try_query('SHOW GRANTS'); if (! $rs_usr) { return; } $re0 = '(^|(\\\\\\\\)+|[^\\\\])'; // non-escaped wildcards $re1 = '(^|[^\\\\])(\\\)+'; // escaped wildcards while ($row = PMA_DBI_fetch_row($rs_usr)) { // extract db from GRANT ... ON *.* or GRANT ... ON db.* $db_name_offset = strpos($row[0], ' ON ') + 4; $show_grants_dbname = substr( $row[0], $db_name_offset, strpos($row[0], '.', $db_name_offset) - $db_name_offset ); $show_grants_dbname = PMA_Util::unQuote($show_grants_dbname, '`'); $show_grants_str = substr($row[0], 6, (strpos($row[0], ' ON ') - 6)); if ($show_grants_str == 'RELOAD') { $GLOBALS['is_reload_priv'] = true; } /** * @todo if we find CREATE VIEW but not CREATE, do not offer * the create database dialog box */ if ($show_grants_str == 'ALL' || $show_grants_str == 'ALL PRIVILEGES' || $show_grants_str == 'CREATE' || strpos($show_grants_str, 'CREATE,') !== false ) { if ($show_grants_dbname == '*') { // a global CREATE privilege $GLOBALS['is_create_db_priv'] = true; $GLOBALS['is_reload_priv'] = true; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'][] = '*'; // @todo we should not break here, cause GRANT ALL *.* // could be revoked by a later rule like GRANT SELECT ON db.* break; } else { // this array may contain wildcards $GLOBALS['dbs_where_create_table_allowed'][] = $show_grants_dbname; $dbname_to_test = PMA_Util::backquote($show_grants_dbname); if ($GLOBALS['is_create_db_priv']) { // no need for any more tests if we already know this continue; } // does this db exist? if ((preg_match('/' . $re0 . '%|_/', $show_grants_dbname) && ! preg_match('/\\\\%|\\\\_/', $show_grants_dbname)) || (! PMA_DBI_try_query('USE ' . preg_replace('/' . $re1 . '(%|_)/', '\\1\\3', $dbname_to_test)) && substr(PMA_DBI_getError(), 1, 4) != 1044) ) { /** * Do not handle the underscore wildcard * (this case must be rare anyway) */ $GLOBALS['db_to_create'] = preg_replace( '/' . $re0 . '%/', '\\1...', $show_grants_dbname ); $GLOBALS['db_to_create'] = preg_replace( '/' . $re1 . '(%|_)/', '\\1\\3', $GLOBALS['db_to_create'] ); $GLOBALS['is_create_db_priv'] = true; /** * @todo collect $GLOBALS['db_to_create'] into an array, * to display a drop-down in the "Create database" dialog */ // we don't break, we want all possible databases //break; } // end if } // end elseif } // end if } // end while PMA_DBI_free_result($rs_usr); // must also cacheUnset() them in // libraries/plugins/auth/AuthenticationCookie.class.php PMA_Util::cacheSet('is_create_db_priv', $GLOBALS['is_create_db_priv'], true); PMA_Util::cacheSet('is_process_priv', $GLOBALS['is_process_priv'], true); PMA_Util::cacheSet('is_reload_priv', $GLOBALS['is_reload_priv'], true); PMA_Util::cacheSet('db_to_create', $GLOBALS['db_to_create'], true); PMA_Util::cacheSet( 'dbs_where_create_table_allowed', $GLOBALS['dbs_where_create_table_allowed'], true ); } // end function if (!PMA_DRIZZLE) { PMA_analyseShowGrant(); } else { // todo: for simple_user_policy only database with user's login can be created // (unless logged in as root) $GLOBALS['is_create_db_priv'] = $GLOBALS['is_superuser']; $GLOBALS['is_process_priv'] = false; $GLOBALS['is_reload_priv'] = false; $GLOBALS['db_to_create'] = ''; $GLOBALS['dbs_where_create_table_allowed'] = array('*'); } ?>