Yes, it is vulnerable. But other responders failed to note that along with the normal escaping (like mysql_real_escape_string()
) you also need to escape the % character for LIKE clause!
mysql_real_escape_string(addcslashes($str, "%_"))
The trick to grasp here is that there is nothing like "universal quoting".
When quoting, you always quote text for some particular output, like:
- string value for mysql query
like
expression for mysql query
- html code
- json
- mysql regular expression
- php regular expression
For each case, you need different quoting, because each usage is present within different syntax context. This also implies that the quoting shouldn't be made at the input into PHP, but at the particular output! Which is the reason why features like magic_quotes_gpc
are broken (never forget to handle it, or better, assure it is switched off!!!).
So, what methods would one use for quoting in these particular cases? (Feel free to correct me, there might be more modern methods, but these are working for me)
mysql_real_escape_string($str)
mysql_real_escape_string(addcslashes($str, "%_"))
htmlspecialchars($str)
json_encode()
- only for utf8! I use my function for iso-8859-2
mysql_real_escape_string(addcslashes($str, '^.[]$()|*+?{}'))
- you cannot use preg_quote in this case because backslash would be escaped two times!
preg_quote()