8

OK consider this url:

example.com/single.php?id=21424

It's pretty obvious to you and i that the PHP is going to take the id and run it through a mysql query to retrieve 1 record to display it on the page.

Is there anyway some malicious hacker could mess this url up and pose a security threat to my application/mysql DB?

Thanks

benhowdle89
  • 35,602
  • 65
  • 197
  • 321

3 Answers3

11

Of course, never ever ever consider a user entry (_GET, _POST, _COOKIE, etc) as safe.

Use mysql_real_escape_string php function to sanitize your variables: http://php.net/manual/en/function.mysql-real-escape-string.php

About SQL injections : http://en.wikipedia.org/wiki/SQL_injection

CocoaBean
  • 297
  • 6
  • 19
Intrepidd
  • 18,310
  • 5
  • 54
  • 63
2

All depends on the filtering you explicitely (with filter_var() for instance) or implictely (by using prepared statements for instance) use.

greg0ire
  • 22,009
  • 15
  • 69
  • 96
1

Well there is Sql injection http://en.wikipedia.org/wiki/SQL_injection

Voooza
  • 721
  • 4
  • 8