PHP protection of GET parameters

烂漫一生 提交于 2019-12-17 19:40:37

问题


OK consider this url:

example.com/single.php?id=21424

It's pretty obvious to you and i that the PHP is going to take the id and run it through a mysql query to retrieve 1 record to display it on the page.

Is there anyway some malicious hacker could mess this url up and pose a security threat to my application/mysql DB?

Thanks


回答1:


Of course, never ever ever consider a user entry (_GET, _POST, _COOKIE, etc) as safe.

Use mysql_real_escape_string php function to sanitize your variables: http://php.net/manual/en/function.mysql-real-escape-string.php

About SQL injections : http://en.wikipedia.org/wiki/SQL_injection




回答2:


All depends on the filtering you explicitely (with filter_var() for instance) or implictely (by using prepared statements for instance) use.




回答3:


Well there is Sql injection http://en.wikipedia.org/wiki/SQL_injection



来源:https://stackoverflow.com/questions/5089549/php-protection-of-get-parameters

标签
易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!