Hi,

On Tue, Aug 8, 2017 at 12:58 PM, Jens Alfke <j...@mooseyard.com> wrote:
>
>> On Aug 5, 2017, at 6:48 AM, Edmondo Borasio <edmondobora...@gmail.com> wrote:
>>
>> *$query1="INSERT INTO Table"."(ID,name,surname)"."VALUES(\' ' . $NewID .
>> '\','newName','newSurname');"; *
>
> It’s a very, very bad idea to insert variable strings directly into a SQL 
> query like this. If the content of those strings is unknown or untrusted data 
> (as it usually is), it leaves you wide open to SQL Injection Attacks, which 
> give an attacker full access to your database. This is probably the single 
> most common form of attack against web applications.

Yup.
Just google "Jonny Drop All Tables". ;-)

Thank you.

>
> Your PHP SQLite API includes facilities for safely plugging variables into 
> the query, similar to printf. You put a placeholder like “?” into the SQL 
> string and then pass the actual value as a separate parameter to the PHP 
> function. That’s the right way to do it. (As a bonus, it lets you precompile 
> the query and reuse it, which speeds up your code.)
>
> —Jens
> _______________________________________________
> sqlite-users mailing list
> sqlite-users@mailinglists.sqlite.org
> http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to