Correct escaping of untrusted data
От | Geoff Caplan |
---|---|
Тема | Correct escaping of untrusted data |
Дата | |
Msg-id | 9898503310.20040731100907@variosoft.com обсуждение исходный текст |
Ответы |
Re: Correct escaping of untrusted data
Re: Correct escaping of untrusted data |
Список | pgsql-general |
Hi folks, The thread on injection attacks was very instructive, but seemed to run out of steam at an interesting point. Now you guys have kindly educated me about the real nature of the issues, can I ask again what effective escaping really means? Are the standard escaping functions found in the PHP, Tcl etc APIs to Postgres bombproof? Are there any encodings that might slip through and be cast to malicious strings inside Postgres? What about functions like convert(): could they be used to slip something through the escaping function? I don't really have enough knowledge in this area to be confident in the results of my own experiments. Any advice from the more technically savvy would be much appreciated. ------------------ Geoff Caplan Vario Software Ltd (+44) 121-515 1154
В списке pgsql-general по дате отправления: