Reply to Re: mySQL security

Your name:

Reply:


Posted by Andy Jeffries on 03/23/06 01:02

On Wed, 22 Mar 2006 21:52:11 +0000, Paul Furman wrote:

> How to I clean up SQL hacking such as this:
> /?PAGE=mycode.php&filter_in_url=%27+and+%27a%27%3D%27b%27+UNION+ALL+SELECT+my_table%2C+my_table%2C+my_field%2C+<snip>+FROM+another_table+%23
> I've got 'filter_in_url' that searches & limits the display but got hacked
> with something like the above line. I just want a couple words but not
> huge long malicious type stuff obviously. I will sometimes need to have
> quotes in the filter string (%27) although now that I check this doesn't
> currently work but I guess that's a separate issue. I'm not even sure what
> the %2C or %23 are doing. I suppose I could truncate the filter to a
> couple dozen characters, there probably isn't much that could be done in
> the length that I need.
>
> My current approach is to str_replace 'JOIN' 'DROP' etc. This is not a
> high security web page, really boring stuff, just some hacker got bored &
> decided to pick on it for fun.
>
> Thanks

I'd go with passing each of your parameter through:

http://uk.php.net/mysql-real-escape-string

It will escape all quotes properly.

Cheers,


Andy


--
Andy Jeffries MBCS CITP ZCE | gPHPEdit Lead Developer
http://www.gphpedit.org | PHP editor for Gnome 2
http://www.andyjeffries.co.uk | Personal site and photos

[Back to original message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  England, UK  •  статьи на английском  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  DVD MP3 AVI MP4 players codecs conversion help
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites

Copyright © 2005-2006 Powered by Custom PHP Programming

Сайт изготовлен в Студии Валентина Петручека
изготовление и поддержка веб-сайтов, разработка программного обеспечения, поисковая оптимизация