Re: Sql injection attacks

Поиск
Список
Период
Сортировка
От B. van Ouwerkerk
Тема Re: Sql injection attacks
Дата
Msg-id 6.0.0.22.0.20040729123957.02ac5b70@pop.atz.nl
обсуждение исходный текст
Ответ на Re: Sql injection attacks  (Harald Fuchs <hf0722x@protecting.net>)
Список pgsql-general
> > That can be confirmed by setting $dbh->trace_level to something greater
> or equal
> > than 2 and looking at the Pg DBD driver's output.
>
>Shit, you're right.  The $dbh->quote() called for the placeholders
>escapes strings for INSERTing, but not for LIKE comparisons.  So this
>is one of the few places where using placeholders is not enough.
>
>At least my erroneous assumption can't be used for an SQL injection
>attack - you just get more results than you would get if you escape
>the wildcards by hand.

I've been reading this discussion and I asked myself whether you guys
remove/replace unwanted chars from strings you get from the web or not..

If you do remove them AFAIK it doesn't only prevent SQL injection but also XSS.



B.


В списке pgsql-general по дате отправления:

Предыдущее
От: Harald Fuchs
Дата:
Сообщение: Re: Sql injection attacks
Следующее
От: Elie Nacache
Дата:
Сообщение: how to limit user to open another session