On 29/07/15 16:11, Craig Francis wrote: > I completely disagree... prepared statements are just as vulnerable, and so > are ORM's. > > You can push developers towards these solutions, and that would be good, but > you are completely blind if you think an uneducated developer won't do: > > if ($stmt = $mysqli->prepare("SELECT District FROM City WHERE Name=" . > $_GET['name'])) { > }
But that is a perfect example of what I am talking about. You do not educate people by publishing the very thing that is wrong. You educate them by pointing out to them WHY the '?' was there in the first place. Since the taint extension only covers mysql and sqlite it's of little use if we manage to convert 'uneducated developer' to any of the more secure databases, and that was one of the reasons why mysql was dropped from being loaded by default. Once one starts from a base of parametrised sql queries the lax programming methods many mysql guides and books continue to push can be reversed. Throwing more bloat into php to create 'WTF' errors just adds to a new users frustration and annoys experienced users who have very good reasons for building queries using clean variables. MANY abstraction layers use variables to add prefixes to table names or fields. Educate ... don't nanny ... -- Lester Caine - G8HFL ----------------------------- Contact - http://lsces.co.uk/wiki/?page=contact L.S.Caine Electronic Services - http://lsces.co.uk EnquirySolve - http://enquirysolve.com/ Model Engineers Digital Workshop - http://medw.co.uk Rainbow Digital Media - http://rainbowdigitalmedia.co.uk -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php