[web2py] Re: SQL Injection Attacks

2014-02-03 Thread Massimo Di Pierro
SQL is a serialized protocol. The application sends to the database one single string no matter what API you use. The only difference between this: execute('SELECT * FROM Orders WHERE OrderId=%s' % escape(userdata)) and this execute('SELECT * FROM Orders WHERE OrderId=?', userdata) is wheth

[web2py] Re: SQL Injection Attacks

2014-02-03 Thread horridohobbyist
I understand what everyone is saying. However, a friend of mine still questions whether web2py's security model is absolutely rock-solid. Even though SQL injection is "impossible" in web2py, there may still be a way to circumvent the security. For example, he says... Let me illustrate with pseu

Re: [web2py] Re: SQL Injection Attacks

2014-02-02 Thread Ovidio Marinho
http://www.pythonsecurity.org/wiki/web2py/ Ovidio Marinho Falcao Neto ITJP.NET.BR ovidio...@gmail.com itjp.net...@gmail.com Brasil 2014-02-02 Cliff Kachinske : > http://web2py.com/books/default/chapter/29/01/intro

[web2py] Re: SQL Injection Attacks

2014-02-02 Thread Cliff Kachinske
http://web2py.com/books/default/chapter/29/01/introduction#Security On Sunday, February 2, 2014 11:33:02 AM UTC-5, horridohobbyist wrote: > > Does web2py have a function or means of "sanitizing" user input in order > to prevent SQL injection attacks? > > Thanks. > -- Resources: - http://web2py

[web2py] Re: SQL Injection Attacks

2014-02-02 Thread Niphlod
if you pass "raw variables" to DAL's queries, the input is sanitized. If you instead try to build a query doing cut/paste, e.g. myquery = "select * from table where field = %s" % raw_variable then it's not sanitized. On Sunday, February 2, 2014 5:33:02 PM UTC+1, horridohobbyist wrote: > > Does