The word (pseudo) implied that my url metadata effectively generates a sql
statement. Query metadata in the url on the server side is generated as sql.

This is exactly what phpMyAdmin does...my app presents no more a security
problem than theirs.

The script runs as guest/guest against mysql unless realm authentication has
been setup on the web server, in which case it runs with credentials of
whose already authenticated.

Unless someone's auth'd with my personal credentials, all they can do is
query a stupid quotations table in a database of mine. No deletes, inserts,
or updates.


mike

-----Original Message-----
From: Jay Blanchard [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2003 4:53 AM
To: Mike Klein; [EMAIL PROTECTED]
Subject: RE: [PHP] How to update url on server side...php header func?


[snip]
Basically original url is (pseudo) "select * from table where rec=5"
...
any ideas of how to better go about this?
[/snip]

The query is in the URL? Really? You have just asked for a security
problem (google for "sql injection" and you'll see what I am talking
about). If you have anything that looks like
http://www.yourserver.com/script.php?sql=select you need to stop what
you are doing.

Honestly, I believe that you need to change your code, and without
seeing your current code I couldn't make any further recommendations.

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to