PHP prevents sql injection function usage

WBOY
Release: 2016-07-25 09:12:22
Original
1249 people have browsed it

Use addslashes function in php to prevent SQL injection.

Although many domestic PHP programmers still rely on addslashes to prevent SQL injection, it is still recommended that everyone strengthen checks to prevent SQL injection in Chinese.

The problem with addslashes is that hackers can use 0xbf27 to replace single quotes, while addslashes only changes 0xbf27 to 0xbf5c27, which becomes a valid multi-byte character. 0xbf5c is still regarded as a single quote, so addslashes cannot successfully intercept.

Of course, addslashes is not useless. It is used for processing single-byte strings. For multi-byte characters, use mysql_real_escape_string.

In addition, for the usage of get_magic_quotes_gpc function in the PHP manual, take a look at the following example.

Example:

  1. function post_check($post)
  2. {
  3. if (!get_magic_quotes_gpc()) // Determine whether magic_quotes_gpc is open
  4. {
  5. $post = addslashes($post); // Perform magic_quotes_gpc Filter the submitted data when it is not opened
  6. }
  7. $post = str_replace("_", "_", $post); // Filter out '_'
  8. $post = str_replace("%", "%" , $post); // Filter out ' % '
  9. $post = nl2br($post); // Enter conversion
  10. $post= htmlspecialchars($post); // html tag conversion
  11. return $post;
  12. }
  13. ?>
  14. or
  15. function inject_check($sql_str)
  16. {
  17. return eregi('select|insert|update|delete|'|
  18. function verify_id($id=null)
  19. {
  20. if (! $id) { exit('No parameters submitted!'); } // Judgment of whether it is empty
  21. elseif (inject_check($id)) { exit('The parameters submitted are illegal!'); } // Judgment of injection
  22. elseif ( !is_numeric($id)) { exit('The submitted parameter is illegal!'); } // Numeric judgment
  23. $id = intval($id); // Integerization
  24. return $id;
  25. }
  26. ?>
Copy code

string mysql_real_escape_string ( string $unescaped_string [, resource $link_identifier ] )

This function escapes special characters in unescaped_string and takes into account the current character set of the connection, so it can be used safely with mysql_query().

Note: mysql_real_escape_string() does not escape % and _.

mysql_real_escape_string

Example 1, mysql_real_escape_string() example

  1. $item = "Zak's and Derick's Laptop" ;
  2. $escaped_item = mysql_real_escape_string ( $item );
  3. printf ( "Escaped string: %sn" , $escaped_item );
  4. ?>
Copy code

Output: Escaped string: Zak's and Derick's Laptop

mysql_escape_string This function escapes an unescaped_string, making it safe for use with mysql_query(). Note: mysql_escape_string() does not escape % and _. This function is exactly the same as mysql_real_escape_string(), except that mysql_real_escape_string() accepts a connection handle and transfers the string according to the current character set. mysql_escape_string() does not accept connection parameters and does not care about the current character set setting.

Example 1. mysql_escape_string() example

  1. $item = "Zak's Laptop";
  2. $escaped_item = mysql_escape_string($item);
  3. printf ("Escaped string: %sn", $escaped_item);
  4. ?>
Copy code

Output: Escaped string: Zak's Laptop

The difference between the two functions mysql_real_escape_string and mysql_escape_string: mysql_real_escape_string can only be used when (PHP 4 >= 4.3.0, PHP 5). Otherwise, you can only use mysql_escape_string. The difference between the two is: mysql_real_escape_string takes into account the current character set of the connection, while mysql_escape_string does not. Judgment can be used for comprehensive processing.

Example:

  1. function cleanuserinput($dirty){
  2. if (get_magic_quotes_gpc()) {
  3. $clean = mysql_real_escape_string(stripslashes($dirty));
  4. }else{
  5. $clean = mysql_real_e scape_string($ dirty);
  6. }
  7. return $clean;
  8. }
Copy code

Summary: * addslashes() is forcibly added; * mysql_real_escape_string() will determine the character set, but there are requirements for the PHP version; * mysql_escape_string does not take into account the current character set of the connection.



Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template