Re: Protection from SQL injection
| От | Brendan Jurd |
|---|---|
| Тема | Re: Protection from SQL injection |
| Дата | |
| Msg-id | 37ed240d0804281603g145435b7yc55e835233634627@mail.gmail.com обсуждение исходный текст |
| Ответ на | Re: Protection from SQL injection (PFC <lists@peufeu.com>) |
| Ответы |
Re: Protection from SQL injection
|
| Список | pgsql-hackers |
On Tue, Apr 29, 2008 at 7:00 AM, PFC <lists@peufeu.com> wrote:
> I have found that the little bit of code posted afterwards did eliminate
> SQL holes in my PHP applications with zero developer pain, actually it is
> MORE convenient to use than randomly pasting strings into queries.
>
> You just call
> db_query( "SELECT * FROM table WHERE column1=%s AND column2=%s", array(
> $var1, $var2 ));
>
Implementing this for yourself is crazy; PHP's Postgres extension
already does this for you since 5.1.0:
$result = pg_query_params("SELECT foo FROM bar WHERE baz = $1", array($baz));
http://www.php.net/manual/en/function.pg-query-params.php
Cheers,
BJ
В списке pgsql-hackers по дате отправления: