8

OK consider this url:

example.com/single.php?id=21424

It's pretty obvious to you and i that the PHP is going to take the id and run it through a mysql query to retrieve 1 record to display it on the page.

Is there anyway some malicious hacker could mess this url up and pose a security threat to my application/mysql DB?

Thanks

benhowdle89
  • 36,900
  • 69
  • 202
  • 331

3 Answers3

11

Of course, never ever ever consider a user entry (_GET, _POST, _COOKIE, etc) as safe.

Use mysql_real_escape_string php function to sanitize your variables: http://php.net/manual/en/function.mysql-real-escape-string.php

About SQL injections : http://en.wikipedia.org/wiki/SQL_injection

CocoaBean
  • 295
  • 7
  • 20
Intrepidd
  • 19,772
  • 6
  • 55
  • 63
2

All depends on the filtering you explicitely (with filter_var() for instance) or implictely (by using prepared statements for instance) use.

greg0ire
  • 22,714
  • 16
  • 72
  • 101
1

Well there is Sql injection http://en.wikipedia.org/wiki/SQL_injection

Voooza
  • 749
  • 4
  • 8