Re: Protection from SQL injection
| От | Thomas Mueller |
|---|---|
| Тема | Re: Protection from SQL injection |
| Дата | |
| Msg-id | 5f211bd50804261119x25c6d488hec0cde5bab189ac5@mail.gmail.com обсуждение исходный текст |
| Ответ на | Re: Protection from SQL injection ("Jaime Casanova" <systemguards@gmail.com>) |
| Ответы |
Re: Protection from SQL injection
|
| Список | pgsql-sql |
Hi, > > The 'ALLOW_LITERALS NONE' mode is enabled by the developer itself, or > > by an administrator. > then it solves nothing... > what if the developer never SET ALLOW_LITERALS NONE As I have said, the 'ALLOW_LITERALS NONE' mode is enabled by the developer itself, or by an administrator. The developer may be lazy, but the administrator can enforce this policy. > maybe i can inject "select * from tab where intcol = intcol; set > allow_literals all; add any query you want" How do you inject this? How would the application looks like where this can be injected? Regards, Thomas
В списке pgsql-sql по дате отправления: