>         SQL injection can do all sorts of damage: it can simply delete 
> all of your data; it can reveal admin passwords, employee information, 
> etc. In essence, it enables bad guys to execute any data command they want.
>
>         The rule to follow is always to sanitize inputs from users. Every 
> DB out there has a function for escaping special characters; always make 
> sure that every piece of text from outside the program is run through 
> these methods before passed to the database for execution.

And I'm saying that's exactly what I've done, not out of great security 
consciousness, but simply because it seemed to me the only way the typical 
user was going to be able to handle things was if I only let them enter 
strings for searchable data and forced them to pick names of tables and 
fields from lists.

I'm not saying that if you somehow managed to execute an SQL statement that 
contained nasty code it wouldn't do damage. I am just sitting here 
scratching my head wondering how anybody but a complete idiot would ever 
design a user interface that allows somebody to enter that kind of thing 
and have it be executable, as opposed to being treated as data.

Ken
www.stic-cil.org 


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to