On Mon, Mar 24, 2008 at 2:40 PM, Daniel Brown <[EMAIL PROTECTED]> wrote:
> On Mon, Mar 24, 2008 at 2:29 PM, Jason Pruim <[EMAIL PROTECTED]> wrote:
>  >
>  >  It's already been escaped, $business is pulled out of the database
>  >  after they log in. :)
>
>     I don't care, Prune.
>
>     (I still get a kick out of knowing that.  Who was it, Jochem or
>  Zoltan who said that?  ;-P)
>
>     NEVER trust that the data is escaped regardless of where it
>  originated.  Supposed someone else writes a script to tie into your
>  database and doesn't escape it, and Hagar The Horrible's
>  great-great(^15) grandson, Hacker The Horndog comes in and finds the
>  vulnerability, and enters the company name as "';DELETE FROM current
>  WHERE 1;SELECT * FROM current WHERE 1 "?
>
>     Bye, data.
>
>     Learn: http://xkcd.com/327/
>
>
>  --
>  </Daniel P. Brown>
>  Forensic Services, Senior Unix Engineer
>  1+ (570-) 362-0283
>
>  --
>
>
> PHP General Mailing List (http://www.php.net/)
>  To unsubscribe, visit: http://www.php.net/unsub.php
>
>

Jason,

Listen to Daniel's advice on this.  Hacker issues aside, wouldn't it
be embarrassing if someone typed O'Brien in the input field and it
gave a white screen or worse yet text that said "Error with SQL?"

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to