> After reading the following pages...
> 
> The Unexpected SQL Injection - When Escaping Is Not Enough 
> http://webappsec.org/projects/articles/091007.shtml
> 
> SQL Injection Cheat Sheet
> http://ferruh.mavituna.com/makale/sql-injection-cheatsheet/
> 
> I wonder if our beloved <cfqueryparam> and <cfprocparam> are 
> strong enough to defend all of the attacks mentioned in the 
> pages above. Would any CF security expert please comment on this?

CFQUERYPARAM doesn't rely on escaping values; it builds a prepared statement
that separates SQL code from input values. So, yes, it is sufficient to
prevent any SQL injection attack.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Check out the new features and enhancements in the
latest product release - download the "What's New PDF" now
http://download.macromedia.com/pub/labs/coldfusion/cf8_beta_whatsnew_052907.pdf

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:290826
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4

Reply via email to