Does htmlspecialchars protect this MySQL query?

2019-09-02 22:04发布

I got a $_GET and users are able to send the $_GET string to the MySQL, so quick question:

Is this query:

mysql_query("SELECT XX FROM ZZ WHERE YY %LIKE% " . htmlspecialchars($_get['string']) . ";");

enough to be safe? or I should add something more than htmlspecialchars() to be safe?

Thank you in advance for all replies.

标签: php mysql get
3条回答
三岁会撩人
2楼-- · 2019-09-02 22:52

Unsafe.

Trivial example data that even shows htmlspecialchars doing "it's thing" -- it's just the wrong "thing".

1;DROP TABLE all_your_precious_data--&

Happy coding.


Solution: Use placeholders as per PDO or mysqli (or use mysql_real_escape_string if you wish to keep promoting outdated practices...)

See Best way to stop SQL injection in PHP and Prevent injection SQL with PHP and Can SQL injection be prevented with just addslashes?

查看更多
我欲成王,谁敢阻挡
3楼-- · 2019-09-02 23:03

It's probably unsafe, and you'd better use mysql_real_escape_string.

查看更多
神经病院院长
4楼-- · 2019-09-02 23:07

htmlspecialchars has nothing to do with MySQL. It's for escaping HTML special characters, characters that have special meaning when evaultated as HTML. You should use it before you write untrusted data to the browser, not to the database.

You need to remove htmlspecialchars entirely, and use mysql_real_escape_string, or better yet, PDO.

查看更多
登录 后发表回答