Hello Steven,

Friday, August 15, 2003, 8:54:53 AM, you wrote:


SB> Btw, it's also never adequate validation to let users inject their own
SB> SQL, even in a SELECT.  They might add impossibly complex stuff to the
SB> where clause and cause your database to wedge for days, or add a 'or 1 =
SB> 1' to bypass security checks for information.

This can only happen by programmers who don't care at all. You should at least
use a quoting function for you sql generation and then - ups - you're already
done.

The original cause was easy but Rasmus already ensured with the input filters
that security can be kept every scenario.


-- 
Best regards,
 Marcus                            mailto:[EMAIL PROTECTED]


-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to