stored procedures are your friends.

they enforce strict datatypes.

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: 12 April 2002 17:11
> To: CF-Talk
> Subject: RE: Preventing SQL injection attacks...?
> 
> 
> This is probably the biggest security problem with web 
> applications.  It
> boils down to securing and validating your input.  Most of 
> these attacks
> are successful only when you're evaluating a number - since a string
> won't execute SQL, but only evaluate it as a string input.  
> So if you're
> expecting numbers, then validate, using isNumeric() or CFQueryParam.  
> 
> ---
> Billy Cravens
> 
> 
> -----Original Message-----
> From: Ian Lurie [mailto:[EMAIL PROTECTED]] 
> Sent: Friday, April 12, 2002 10:17 AM
> To: CF-Talk
> Subject: Preventing SQL injection attacks...?
> 
> Hi all,
> 
> Had some interesting errors in our logs yesterday. It appears that
> someone's
> trying to hack our database by inserting SQL query language 
> into the URL
> string.
> 
> We're doing all the standard security measures, including 
> filtering for
> single quotes, using database passwords, and the like, and we 
> locked out
> their IP immediately. But really, how do you prevent this? Any
> ideas/feedback out there?
> 
> Ian
> 
> Portent Interactive
> Helping clients build customer relationships on the web since 1995
> Consulting, design, development, measurement
> http://www.portentinteractive.com
> 
> 
> 
______________________________________________________________________
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to