Specific usage
Addslashes prevent SQL injection
Although many domestic PHP programmers still rely on addslashes to prevent SQL injection, it is recommended that everyone strengthen checks to prevent SQL injection in Chinese. The problem with addslashes is that hackers can use 0xbf27 instead of single quotes, while addslashes only changes 0xbf27 to 0xbf5c27, which becomes a valid multi-byte character. 0xbf5c is still regarded as a single quote, so addslashes cannot successfully intercept.
Of course, addslashes is not useless. It is used for processing single-byte strings. For multi-byte characters, use mysql_real_escape_string.
In addition, for the get_magic_quotes_gpc in the php manual
Example:
The code is as follows | |
or
function inject_check($sql_str) |
String mysql_real_escape_string ( string $unescaped_string [, resource $link_identifier ] )
This function escapes special characters in unescaped_string and takes into account the current character set of the connection, so it can be used safely with mysql_query().
Note: mysql_real_escape_string() does not escape % and _.
mysql_real_escape_string
Example#1 mysql_real_escape_string() Example
The code is as follows | |||||
$item = "Zak's and Derick's Laptop" ;
The above example will produce the following output: Escaped string: Zak's and Derick's Laptop |
mysql_escape_string
This function escapes unescaped_string so that it can be safely used in mysql_query().
Note: mysql_escape_string() does not escape % and _.
This function is exactly the same as mysql_real_escape_string(), except that mysql_real_escape_string() accepts a connection handle and transfers the string according to the current character set. mysql_escape_string() does not accept connection parameters and does not care about the current character set setting.
Example 1. mysql_escape_string() Example
The code is as follows | |||||
$item = "Zak's Laptop";
|
The difference between the two functions mysql_real_escape_string and mysql_escape_string:
Mysql_real_escape_string can only be used under (PHP 4 >= 4.3.0, PHP 5). Otherwise, you can only use mysql_escape_string. The difference between the two is: mysql_real_escape_string takes into account the current character set of the connection, while mysql_escape_string does not.
We can use judgment to handle it comprehensively
代码如下 | |
function cleanuserinput($dirty){ if (get_magic_quotes_gpc()) { $clean = mysql_real_escape_string(stripslashes($dirty)); }else{ $clean = mysql_real_escape_string($dirty); } return $clean; } |
To summarize:
* addslashes() is a forced addition;
* mysql_real_escape_string() will determine the character set, but there are requirements for the PHP version;
* mysql_escape_string does not consider the current character set of the connection.