sean Thu Oct 28 10:25:51 2004 EDT
Modified files: /phpdoc/en/security database.xml Log: - Fixed [some of the] grammar - Changed recommendation of escape mechanism http://cvs.php.net/diff.php/phpdoc/en/security/database.xml?r1=1.7&r2=1.8&ty=u Index: phpdoc/en/security/database.xml diff -u phpdoc/en/security/database.xml:1.7 phpdoc/en/security/database.xml:1.8 --- phpdoc/en/security/database.xml:1.7 Thu Sep 9 08:49:33 2004 +++ phpdoc/en/security/database.xml Thu Oct 28 10:25:50 2004 @@ -1,5 +1,5 @@ <?xml version="1.0" encoding="iso-8859-1"?> -<!-- $Revision: 1.7 $ --> +<!-- $Revision: 1.8 $ --> <!-- splitted from ./index.xml, last change in rev 1.66 --> <chapter id="security.database"> <title>Database Security</title> @@ -412,11 +412,16 @@ </listitem> <listitem> <simpara> - Quote each non numeric user input which is passed to the database with - <function>addslashes</function> or <function>addcslashes</function>. + Quote each non numeric user supplied value that is passed to the + database with the database-specific string escape function (e.g. + <function>mysql_escape_string</function>, + <function>sql_escape_string</function>, etc.). If a database-specific + string escape mechanism is not available, the + <function>addslashes</function> and <function>str_replace</function> + functions may be useful (depending on database type). See <link linkend="security.database.storage">the first example</link>. - As the examples shows, quotes burnt into the static part of the query - is not enough, and can be easily cracked. + As the example shows, adding quotes to the static part of the query + is not enough, making this query easily crackable. </simpara> </listitem> <listitem>