-Kevin Waddell Proverbs 3:5-6 -------------------------------------------- On Fri, 5/15/15, Ruprecht Helms <rhelms@xxxxxxxxxxxx> wrote: Subject: Re: SQL Injection To: php-db@xxxxxxxxxxxxx Date: Friday, May 15, 2015, 10:16 AM On 15.05.2015 07:21, Karl DeSaulniers wrote: > On May 14, 2015, at 11:11 PM, Onatawahtaw <onatawahtaw@xxxxxxxx> wrote: > >> Hi Karl, >> >> If you look at the link you provided you'll notice that some of the code is for ASP.net and some is for PHP. I have looked in the link. Most problems by inject an sql-Code is to add something in the where-clause let it end with a semicolon and add an additional sql-command behind the semicolon. In this case you have two SQL-Command. The first maybe a Select-Command and the next can be to drop a whole table with all its content. One thing you can do is to trim the Select-Statement and trough all behind a semicolon in addition the semicolon away. To assume that any SQL injection is going to be by a second statement is very risky. Someone can simply add an "or" section to the where clause. It will still be one SQL statement and your trim will have done nothing to solve the problem. It is best not to make that assumption and not bother with trimming. Also, it would be tricky finding a proper trim function especially if your form input should contain semi-colons, etc. -- PHP Database Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php