See if this satisifies your needs...a complete example showing parameterized 
statements fixing the problem...



http://codesnippets.joyent.com/posts/show/2384





Michael D. Black

Senior Scientist

Advanced Analytics Directorate

Advanced GEOINT Solutions Operating Unit

Northrop Grumman Information Systems

________________________________
From: sqlite-users-boun...@sqlite.org [sqlite-users-boun...@sqlite.org] on 
behalf of Gert Corthout [gert_corth...@hotmail.com]
Sent: Thursday, October 20, 2011 3:21 AM
To: sqlite-users@sqlite.org
Subject: EXT :[sqlite] string conatenated sql statements


hello,

I am looking at the data layer of my company's software and noticed we build 
our queries with string concatenation (including user input). As a former 
Oracle and SqlServer developer this sends shivers down my spine. I am trying to 
convince management to get a budget for a switch to parametrized queries.

My argument so far is that parametrized queries are way faster if used properly.
The next obvious argument is sql injection. On all string input a simple 
conversion is done: any ' is replaced by '', that's it. This seems to block off 
any sql injection right there as the escape character \ doesn't work in sqlite.

So my question is, is there any way to perform a sqlinjection attack?
Alternatively can I make sql statements fail by including funky characters or 
character combinations?

thanks in advance,
Gert
_______________________________________________
sqlite-users mailing list
sqlite-users@sqlite.org
http://sqlite.org:8080/cgi-bin/mailman/listinfo/sqlite-users
_______________________________________________
sqlite-users mailing list
sqlite-users@sqlite.org
http://sqlite.org:8080/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to