PDA

View Full Version : SQL injection


Jakeman
04-03-2004, 01:01 AM
I am testing an external script I wrote. I just discovered that the user can inject code into an UPDATE query through one of the form fields by entering clever values. For example:

UPDATE tablename SET field = '$_POST[var]'

So I need to check that the posted variable is clean. I'm not sure where to start and I want to cover all possibilities. Any hints, tips, advice?

thx

vB3 3.0.0
I don't suppose vB3 has a function for this?

filburt1
04-03-2004, 02:37 AM
vB3 has the globalize() function. This works too:

foreach ($_REQUEST as $key => $value)
{
$_REQUEST[$key] = htmlspecialchars_uni($value); // htmlspecialchars() for non-vB pages
}

filburt1
04-03-2004, 02:38 AM
Whoops, that's HTML injection...SQL injection is the same, but use addslashes() instead of htmlspecialchars[_uni]().

Jakeman
04-03-2004, 04:23 AM
Oh that makes sense... to escape bad characters.

Where is addslashes() defined? I can't find it.

NTLDR
04-03-2004, 04:38 PM
addslashes() is a default PHP function :)

http://uk.php.net/addslashes

Jakeman
04-03-2004, 10:47 PM
thx