It seems to me there are two different issues here, that only partially overlap.

1. data is input into a field - say an varchar/ntext/text/memo field - that will be 
used to display onto a page.  The user could include all sorts of nasties, both simple 
and complex.  Injected SQL isn't much of a danger here, if at all.  For a field like 
this at the very least you need a scrubber like CodeCleaner (which for the sake of 
argument strips out the CFQUERY statements someone would wrap around the 
aforementioned SQL), or something you've home-grown.

2. Data is used - possibly from a form input but maybe not - in a WHERE statement; 
i.e. SQL injection.  cfqueryparam fixes that rather handily all on its own.  Malicious 
code of another nature isn't likely to be of any use in a WHERE clause, but 
cfqueryparam handles this as well.

So my ideal system scrubs the form inputs, and further lumps them into a cfqueryparam 
on general principles.  My WHERE clause uses cfqueryparam only.  I should be pretty 
safe.

What have I missed on the above?
______________________________________________________________________
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to