| From: | <operationsengineer1(at)yahoo(dot)com> |
|---|---|
| To: | Ed Finkler <coj(at)cerias(dot)purdue(dot)edu>, Volkan YAZICI <volkan(dot)yazici(at)gmail(dot)com> |
| Cc: | pgsql-php(at)postgresql(dot)org |
| Subject: | Re: Effectiveness of pg_escape_string at blocking SQL injection |
| Date: | 2005-05-27 17:25:52 |
| Message-ID: | 20050527172552.50460.qmail@web52409.mail.yahoo.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-php |
--- Ed Finkler <coj(at)cerias(dot)purdue(dot)edu> wrote:
> Volkan YAZICI wrote:
>
> [snip]
>
> > If you think, they're not enough for SQL-Injection
> attacks, I'd advice
> > you to patch libpq code, not PHP.
>
> This is very helpful information. My initial
> thinking is that this
> wouldn't be effective at catching SQL injections,
> but I'll need to
> bounce this off a few other folks.
>
> Thanks!
do let us all know what you find out.
bruno and all... what are bind parameters? how can i
avoid building sql from user input when my sql depends
on user input?
tia...
__________________________________
Do you Yahoo!?
Yahoo! Small Business - Try our new Resources site
http://smallbusiness.yahoo.com/resources/
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Bruno Wolff III | 2005-05-27 18:13:41 | Re: Effectiveness of pg_escape_string at blocking SQL injection |
| Previous Message | Ed Finkler | 2005-05-27 16:33:33 | Re: Effectiveness of pg_escape_string at blocking SQL injection |