SQL injection, insertion

SQL injection is an attack where malicious code is passed to an SQL Server for execution. The attack can result in unauthorized access to confidential data, or destruction of critical data.

Before you try to read the methods below, realize that this should only be a concern for PHP developers and the like. If you are using a database driven program (e.g. WordPress, Joomla, OSCommerce), then all you need to do is upgrade your programs to the latest version available.

Methods to prevent SQL injection

Escaping

One way to prevent injections is to escape dangerous characters (i.e. backslash, apostrophe and semicolon). In PHP, it is typical to escape the input using the function mysql_real_escape_string before sending the SQL query. Example: $Uname = mysql_real_escape_string($Uname);

-------------------------------------------------------------------------------------------------

$Pword = mysql_real_escape_string($Pword);
$query = "SELECT * FROM Users where UserName='$Uname' and Password='$Pword'";
mysql_query($query);

--------------------------------------------------------------------------------------------------

Parameterized statements

A parameterized query uses placeholders for the input, and the parameter values are supplied at execution time.

--------------------------------------------------------------------------------------------------

$params = array($Uname, $Pword);
$sql = 'INSERT INTO Users (UserName, Password) VALUES (?, ?)';
$query = sqlsrv_query($connection, $sql, $params);

--------------------------------------------------------------------------------------------------

Advanced: In PHP version 5 and above, there are multiple choices for using parameterized statements; the PDO database layer is one of them. There are also vendor-specific methods; for example, MySQL 4.1 + used with the mysqli extension.

Was this answer helpful?

 Print this Article

Also Read

CPU resource usage

SHARED SERVERS Overline India allows a maximum of 25% CPU usage limit. You may exceed this limit...

Cpanel Protects From Hackers

Hello, You must keep CMS up to date. Once this happens the attacks will stop or come to a...

It’s a trap! Phishing Scams and Malware

Phishing scams and malware infected sites are some of the many problems that the Abuse &...

The Ultimate Guide to Fixing and Recovering Your Hacked Website

Having your website hacked is one of the worst feelings in the world. It can do major damage to...

How to handle the Google Attack Page?

When you see the dreaded Google attack site warning, you should immediately submit a...