|
Posted by Paul Furman on 03/23/06 01:35
Andy Jeffries wrote:
> On Wed, 22 Mar 2006 21:52:11 +0000, Paul Furman wrote:
>
>
>>How to I clean up SQL hacking such as this:
>>/?PAGE=mycode.php&filter_in_url=%27+and+%27a%27%3D%27b%27+UNION+ALL+SELECT+my_table%2C+my_table%2C+my_field%2C+<snip>+FROM+another_table+%23
>>I've got 'filter_in_url' that searches & limits the display but got hacked
>>with something like the above line. I just want a couple words but not
>>huge long malicious type stuff obviously. I will sometimes need to have
>>quotes in the filter string (%27) although now that I check this doesn't
>>currently work but I guess that's a separate issue. I'm not even sure what
>>the %2C or %23 are doing. I suppose I could truncate the filter to a
>>couple dozen characters, there probably isn't much that could be done in
>>the length that I need.
>>
>>My current approach is to str_replace 'JOIN' 'DROP' etc. This is not a
>>high security web page, really boring stuff, just some hacker got bored &
>>decided to pick on it for fun.
>>
>>Thanks
>
>
> I'd go with passing each of your parameter through:
>
> http://uk.php.net/mysql-real-escape-string
>
> It will escape all quotes properly.
But if I want to use quotes, that would remove them right? There are
cases where the user input should have quotes with my application.
Navigation:
[Reply to this message]
|