> It's insanely easy to make such mistakes though, and php.net is full of
> such problems (I found 2 in 15 minutes), so it's not a 'stupid

I'd like to hear where these problems are, off list of course.

> minor bugs, as from what I hear the mysql extention can't do chained
> queries yet, so there's no risk of someone injecting whatever SQL they
> choose, making it much harder to do evil.

The current ext/mysql extension doesn't allow multiple queries...
however, it is by no means idiot-proof.. consider:

UPDATE auth_user set password='{$_POST['newpass']}' WHERE
username='$uname';

Now let's say 'newpass' is the string "foo' WHERE username='admin' --"

That'd convert the query to:

UPDATE auth_user set password='foo' WHERE username='admin' -- WHERE
username='realusername'

As you can see, even in mysql it is very easy to do evil despite your
claims. IMO and I believe the opinion of most of the internals community
it is not the responsibility of PHP to correct these and other potential
security holes. 
 
Please let this issue drop.

John
-- 
-~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~-
John Coggeshall                             http://www.coggeshall.org/
john at coggeshall dot org                 

The PHP Developer's Handbook
The definitive PHP5 developer's guide     http://www.php-handbook.com/
-~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~--~=~-


-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to