Re: Protection from SQL injection
От | Tom Lane |
---|---|
Тема | Re: Protection from SQL injection |
Дата | |
Msg-id | 13670.1209267734@sss.pgh.pa.us обсуждение исходный текст |
Ответ на | Re: Protection from SQL injection ("Scott Marlowe" <scott.marlowe@gmail.com>) |
Ответы |
Re: Protection from SQL injection
Re: Protection from SQL injection |
Список | pgsql-sql |
"Scott Marlowe" <scott.marlowe@gmail.com> writes: > Wouldn't it be much simpler to have a version of the libpq client lib > that only understands prepared queries? You could do that, but there's still no way for it to know exactly how the submitted query was constructed. This would block off the types of injections that want to add whole SQL commands, but not ones that just subvert the current query (eg adding OR TRUE to see data you shouldn't). This is really a client problem and only client-side solutions will provide meaningful traction for it. In perl, for instance, the "taint" mechanism is a good way to notice whether any insecure strings are getting into database queries. regards, tom lane
В списке pgsql-sql по дате отправления: