No, the queries written in those examples are patently stupid. Anyone
deliberately circumventing the protection that bind parameters provide
by subsequently forcing using those parameters to be used as literal
SQL gets what they deserve.

mxAjax / CFAjax docs and other useful articles:
http://www.bifrost.com.au/blog/



2009/7/17 Emmit Larson <[email protected]>:
>
> I believe that Brad Wood has made the case for that with his afformentioned
> blog post.
> Emmit
>
> On Thu, Jul 16, 2009 at 8:48 PM, James Holmes <[email protected]>wrote:
>
>>
>> Can you provide examples?
>>
>> mxAjax / CFAjax docs and other useful articles:
>> http://www.bifrost.com.au/blog/
>>
>> 2009/7/17 Emmit Larson <[email protected]>:
>> >
>> >>> CFQUERYPARAM will prevent all SQL injection attacks
>> >
>> > This is demonstrably false. Semantics, arguments and opinions aside,
>> > spreading misinformation like this is irresponsible. An attack can be
>> made
>> > to inject SQL on a CF application using CFQuery that cannot be prevented
>> > with cfqueryparam. To paraphrase Uncle Bill, "...it must follow, as the
>> > night the day, thou canst not then prevent a SQL injection
>> > attacks with cfqueryparam".
>>
>>
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Want to reach the ColdFusion community with something they want? Let them know 
on the House of Fusion mailing lists
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:324619
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to