On 8/24/07, Borokov Smith <[EMAIL PROTECTED]> wrote:
> Daniel Brown schreef:
> > On 8/24/07, Borokov Smith <[EMAIL PROTECTED]> wrote:
> > [snip]
> >
> >> A warrant about your example not being validated, will most likely not
> >> stop the OP from using this code as is, thereby subjecting himself to
> >> SQL injection.
> >> And all it needed was mysql_real_escape_string() in there.
> >>
> >>
> >>
> >
> > Kinda' like this part, right?
> > [snip]
> >
> >> if($_POST['user'] && $_POST['pass']) { // Keep in mind, PASSWORD
> >> has meaning in MySQL
> >>         // Do your string sanitizing here
> >>         // (e.g. - $user = mysql_real_escape_string($_POST['user']);)
> >>         $sql = "SELECT * FROM users WHERE user='".$user."' AND
> >> pass='".$pass."' LIMIT 0,1;";
> >>
> > [/snip]
> >
> >
> Exactly what I was talking about.
> Sorry dude :)
>
> greetz,
>
> boro
>

    No problem at all, brother!  I just left it commented out for the
OP (or anyone reading the archives) to make their own adjustments or
decisions on Best Practices[tm].

-- 
Daniel P. Brown
[office] (570-) 587-7080 Ext. 272
[mobile] (570-) 766-8107

Hey, PHP-General list....
50% off for life on web hosting plans $10/mo. or more at
http://www.pilotpig.net/.
Use the coupon code phpgeneralaug07
Register domains for about $0.01 more than what it costs me at
http://domains.pilotpig.net/.

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to