There is an excellent small article on security vis a vis URL, cookie and
form parameters at:

http://webreview.com/2001/04_13/developers/index02.shtml

My question is what do the members of this list use to prevent malicious
attempts to alter or destroy a database by means of the URL form or cookie
such as an example given in the article:

http://www.mysite.com/doLogin.php?UserID=12345

changed to

http://www.mysite.com/doLogin.php?UserID=12345+TRUNCATE+TABLE+Items

or when someone enters a SQL command in a form text box

12345 TRUNCATE TABLE Items

I guess one could do a content check of every submitted variable to detect
for SQL statements such as TRUNCATE, DELETE, UPDATE, INSERT, etc.

Thanks,
Sebastian


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm

Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to