Re: Sql injection attacks

Поиск
Список
Период
Сортировка
От Doug McNaught
Тема Re: Sql injection attacks
Дата
Msg-id 877jsq7seo.fsf@asmodeus.mcnaught.org
обсуждение исходный текст
Ответ на Re: Sql injection attacks  (Geoff Caplan <geoff@variosoft.com>)
Ответы Re: Sql injection attacks  (Laura Vance <vancel@winfreeacademy.com>)
Список pgsql-general
Geoff Caplan <geoff@variosoft.com> writes:

> Doug,
>
> DM> Geoff Caplan <geoff@variosoft.com> writes:
>
>>> But in web work, you are often using GET/POST data directly in your
>>> SQL clauses, so the untrusted data is part of the query syntax and not
>>> just a value.
>
> DM> Can you give an example of this that isn't also an example of
> DM> obviously bad application design?
>
> I'm no expert to put it mildly, but if you Google for "SQL Injection
> Attack" you'll find a lot of papers by security agencies and
> consultancies. You could start with these:

That doesn't answer my question.  :)

If you're trusting the user (via GET or POST data) to hand you valid
SQL fragments, even just column names, you Deserve To Lose.  The only
things that come in via GET or POST should be data values, and they
should either be explicitly escaped, or used in prepared statements
where the driver takes care of the escaping.

-Doug
--
Let us cross over the river, and rest under the shade of the trees.
   --T. J. Jackson, 1863

В списке pgsql-general по дате отправления:

Предыдущее
От: Geoff Caplan
Дата:
Сообщение: Re: Sql injection attacks
Следующее
От: Lincoln Yeoh
Дата:
Сообщение: Re: Sql injection attacks