应该怎么防止??【论坛浏览】
相关评论作者: catiger 发布日期: 2006-10-06it is about playing with SQL statement.
if u r familiar with SQL, u can write things like -- or // to comment out something
since the web forms or urls accept parameters, the paramemter values may be used to construct SQL statement, if there lacks a check on the parameter values like avoiding special characters like --, //, ', "", some vicious SQL code could be injected by creating a SQL admin account and even injecting some SQL dll in order to obtain the web server privileges...
usually if using Java beans, .NET data acceess layers, the problem does not exist since those prohibited characters will be detected and exceptions will be thrown out.
is there a solution for PHP? there may be...depending on which web framework you choose to develop your applicaiton upon.
my 2 cents
[ 本帖最后由 catiger 于 2006-10-6 04:20 PM 编辑 ]作者: ysoo 发布日期: 2006-10-06英文不好,是否可以用中文说明?共有评论数 2/每页显示数 10