PHP protection of GET parameters

2019-01-19 00:57发布

OK consider this url:

example.com/single.php?id=21424

It's pretty obvious to you and i that the PHP is going to take the id and run it through a mysql query to retrieve 1 record to display it on the page.

Is there anyway some malicious hacker could mess this url up and pose a security threat to my application/mysql DB?

Thanks

标签: php security get
3条回答
地球回转人心会变
2楼-- · 2019-01-19 01:28
萌系小妹纸
3楼-- · 2019-01-19 01:29

All depends on the filtering you explicitely (with filter_var() for instance) or implictely (by using prepared statements for instance) use.

查看更多
女痞
4楼-- · 2019-01-19 01:44

Of course, never ever ever consider a user entry (_GET, _POST, _COOKIE, etc) as safe.

Use mysql_real_escape_string php function to sanitize your variables: http://php.net/manual/en/function.mysql-real-escape-string.php

About SQL injections : http://en.wikipedia.org/wiki/SQL_injection

查看更多
登录 后发表回答