vrana           Wed Sep 29 07:52:42 2004 EDT

  Modified files:              
    /phpdoc/en/reference/mysql/functions        mysql-real-escape-string.xml 
  Log:
  SQL injection (bug #30274)
  
http://cvs.php.net/diff.php/phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml?r1=1.16&r2=1.17&ty=u
Index: phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml
diff -u phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.16 
phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.17
--- phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.16       Mon 
Sep 20 04:52:55 2004
+++ phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml    Wed Sep 29 
07:52:42 2004
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.16 $ -->
+<!-- $Revision: 1.17 $ -->
 <!-- splitted from ./en/functions/mysql.xml, last change in rev 1.100 -->
   <refentry id="function.mysql-real-escape-string">
    <refnamediv>
@@ -88,7 +88,7 @@
 
 // We didn't check $_POST['password'], it could be anything the user wanted! For 
example:
 $_POST['username'] = 'aidan';
-$_POST['password'] = "' OR 1=1";
+$_POST['password'] = "' OR ''='";
 
 // This means the query sent to MySQL would be:
 echo $query;

Reply via email to