vrana Wed Sep 29 07:52:42 2004 EDT
Modified files:
/phpdoc/en/reference/mysql/functions mysql-real-escape-string.xml
Log:
SQL injection (bug #30274)
http://cvs.php.net/diff.php/phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml?r1=1.16&r2=1.17&ty=u
Index: phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml
diff -u phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.16
phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.17
--- phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml:1.16 Mon
Sep 20 04:52:55 2004
+++ phpdoc/en/reference/mysql/functions/mysql-real-escape-string.xml Wed Sep 29
07:52:42 2004
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.16 $ -->
+<!-- $Revision: 1.17 $ -->
<!-- splitted from ./en/functions/mysql.xml, last change in rev 1.100 -->
<refentry id="function.mysql-real-escape-string">
<refnamediv>
@@ -88,7 +88,7 @@
// We didn't check $_POST['password'], it could be anything the user wanted! For
example:
$_POST['username'] = 'aidan';
-$_POST['password'] = "' OR 1=1";
+$_POST['password'] = "' OR ''='";
// This means the query sent to MySQL would be:
echo $query;