In article <[EMAIL PROTECTED]>,
Stuart Felenstein <[EMAIL PROTECTED]> writes:

> Not sure exactly what you mean by a SQL injection
> attack.  I'm thinking a string could be input as
> opposed to an integer ?

Exactly - especially an SQL string.

> The form itself constricts user to a set of choices.

This won't help at all.  An attacker can construct a query with
arbitrary form values.

Never put unchecked/unquoted strings into an SQL query.  I dunno PHP,
but in Perl one would use something like

  my $sth = $dbh->prepare ("
    SELECT whatever
    FROM mytable
    WHERE date >= now() - INTERVAL ? DAY
  ");

  $sth->execute ($numdays);

In this case $numdays gets properly escaped by Perl - if it contains
garbage, the query will fail, but it can't do dangerous things with
your database.


-- 
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/[EMAIL PROTECTED]

Reply via email to