Home Backend Development PHP Tutorial How to prevent injection of MySQL in PHP and a summary of the usage of some anti-injection functions

How to prevent injection of MySQL in PHP and a summary of the usage of some anti-injection functions

Jul 17, 2017 am 11:32 AM
mysql php

Simply determine whether there is an injection vulnerability and the principle. The anti-injection code actually comes and goes with those combinations, and then you can adapt it according to your own program code. The important thing is to know the principle, why these characters are filtered, and what harm the characters have.

1

sql语句如:select  *  from phpben where id = 1

Copy after login

Recommended related mysql video tutorials: "mysql tutorial"

1.mysql injection statement

(1) No user name and password are required

1

2

3

4

5

//正常语句 

$sql ="select * from phpben where user_name='admin' and pwd ='123'"

//在用户名框输入'or'='or'或 'or 1='1 然后sql如下 

$sql ="select * from phpben where user_name=' 'or'='or'' and pwd ='' "

$sql ="select * from phpben where user_name=' 'or 1='1' and pwd ='' ";

Copy after login

(2) Take advantage of a user without entering a password.

1

2

3

4

//正常语句 

$sql ="select * from phpben where user_name='$username' and pwd ='$pwd'"

//利用的用户名是benwin 则用户名框输入benwin'#  密码有无都可,则$sql变成 

$sql ="select * from phpben where user_name=' benwin'#' and pwd ='$pwd'";

Copy after login

This is because one of the annotations in mysql is "#". In the above statement, # has annotated the following content, so the password can be left blank or entered arbitrarily. Some people on the Internet said that "/*" is used to annotate. What the author wants to mention is that when the annotation is only started and not ended with "*/", MySQL will report an error, and it does not say "/**/" cannot be noted, but it is difficult to add "*/" To end the note, there is also "-" that can also be noted in mysql, but please note that there is at least one space after "-", which is "-". Of course, the anti-injection code must take all three into consideration. There are many things worth mentioning. In the anti-injection code, "-" is not considered in the anti-injection range.

(3) Guess a user’s password

1

2

3

4

//正常语句 

$sql ="select * from phpben.com where user_name='$username' and pwd ='$pwd'"

//在密码输入框中输入“benwin' and left(pwd,1)='p'#”,则$sql是 

$sql ="select * from phpben.com where user_name=' benwin' and left(pwd,1)='p'#' and pwd ='$pwd'";

Copy after login

(4)Elevate privileges when inserting data

1

2

3

4

5

//正常语句,等级为1 

$sql = "insert into phpben.com (`user_name`,`pwd`,`level`) values(‘benwin','iampwd',1) "

//通过修改密码字符串把语句变成 

$sql = "insert into phpben.com (`user_name`,`pwd`,`level`) values(‘benwin','iampwd',5)#',1) "

$sql = "insert into phpben.com (`user_name`,`pwd`,`level`) values(‘benwin','iampwd',5)--  ',1) ";这样就把一个权限为1的用户提权到等级5

Copy after login

(5)Malicious update and deletion

1

2

3

4

5

6

7

8

9

//正常语句 

$sql = "update phpben set `user_name` = ‘benwin' where id =1"

//注入后,恶意代码是“1 or id>0” 

$sql = "update phpben set `user_name` = ‘benwin' where id =1 or id>0"

//正常语句 

$sql = "update phpben set  `user_name` ='benwin' where id=1"

//注入后 

$sql = "update phpben set  `user_name` ='benwin' where id>0#' where id=1"

$sql = "update phpben set  `user_name` ='benwin' where id>0-- ' where id=1";

Copy after login

(6) Guess the injection of table information into sql

1

2

3

4

5

6

7

8

//正常语句 

$sql ="select * from phpben1 where`user_name`='benwin'"

//猜表名,运行正常则说明存在phpben2表 

$sql ="select * from phpben1 where`user_name`='benwin' and (select count(*) from phpben2 )>0#' "

//猜表字段,运行正常则说明phpben2表中有字段colum1 

$sql ="select * from phpben1 where`user_name`='benwin' and (select count(colum1) from phpben2 )>0#'"

//猜字段值 

$sql ="select * from phpben1 where`user_name`='benwin' and left(pwd,1)='p'#''";

Copy after login

2. Some functions and notes to prevent injection.

(1)addslashes and stripslashes.

Addslashes add slashes "\'", "\"", "\\", "\NULL" to these "'", """, "\", "NULL", and stripslashes do the opposite. , what should be noted here is whether magic_quotes_gpc=ON is turned on in php.ini. If it is turned on, using addslashes will cause duplication. So when using it, you must first get_magic_quotes_gpc() check

(2)mysql_escape_string() and mysql_ real _escape_string()

mysql_real_escape_string Must be used under (PHP 4 >= 4.3.0, PHP 5). Otherwise, you can only use mysql_escape_string

1

2

3

4

5

6

7

if (PHP_VERSION >= '4.3') 

$string  =  mysql_real_escape_string($string); 

}else 

$string  =  mysql_escape_string($string ); 

}

Copy after login

(3) characters to replace functions and matching functions
str_replace() and perg_replace(). The reason why these functions are also mentioned here is because these functions can be used to filter or replace some Sensitive, deadly character.

The above is the detailed content of How to prevent injection of MySQL in PHP and a summary of the usage of some anti-injection functions. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

The relationship between mysql user and database The relationship between mysql user and database Apr 08, 2025 pm 07:15 PM

In MySQL database, the relationship between the user and the database is defined by permissions and tables. The user has a username and password to access the database. Permissions are granted through the GRANT command, while the table is created by the CREATE TABLE command. To establish a relationship between a user and a database, you need to create a database, create a user, and then grant permissions.

Do mysql need to pay Do mysql need to pay Apr 08, 2025 pm 05:36 PM

MySQL has a free community version and a paid enterprise version. The community version can be used and modified for free, but the support is limited and is suitable for applications with low stability requirements and strong technical capabilities. The Enterprise Edition provides comprehensive commercial support for applications that require a stable, reliable, high-performance database and willing to pay for support. Factors considered when choosing a version include application criticality, budgeting, and technical skills. There is no perfect option, only the most suitable option, and you need to choose carefully according to the specific situation.

RDS MySQL integration with Redshift zero ETL RDS MySQL integration with Redshift zero ETL Apr 08, 2025 pm 07:06 PM

Data Integration Simplification: AmazonRDSMySQL and Redshift's zero ETL integration Efficient data integration is at the heart of a data-driven organization. Traditional ETL (extract, convert, load) processes are complex and time-consuming, especially when integrating databases (such as AmazonRDSMySQL) with data warehouses (such as Redshift). However, AWS provides zero ETL integration solutions that have completely changed this situation, providing a simplified, near-real-time solution for data migration from RDSMySQL to Redshift. This article will dive into RDSMySQL zero ETL integration with Redshift, explaining how it works and the advantages it brings to data engineers and developers.

How to optimize MySQL performance for high-load applications? How to optimize MySQL performance for high-load applications? Apr 08, 2025 pm 06:03 PM

MySQL database performance optimization guide In resource-intensive applications, MySQL database plays a crucial role and is responsible for managing massive transactions. However, as the scale of application expands, database performance bottlenecks often become a constraint. This article will explore a series of effective MySQL performance optimization strategies to ensure that your application remains efficient and responsive under high loads. We will combine actual cases to explain in-depth key technologies such as indexing, query optimization, database design and caching. 1. Database architecture design and optimized database architecture is the cornerstone of MySQL performance optimization. Here are some core principles: Selecting the right data type and selecting the smallest data type that meets the needs can not only save storage space, but also improve data processing speed.

Query optimization in MySQL is essential for improving database performance, especially when dealing with large data sets Query optimization in MySQL is essential for improving database performance, especially when dealing with large data sets Apr 08, 2025 pm 07:12 PM

1. Use the correct index to speed up data retrieval by reducing the amount of data scanned select*frommployeeswherelast_name='smith'; if you look up a column of a table multiple times, create an index for that column. If you or your app needs data from multiple columns according to the criteria, create a composite index 2. Avoid select * only those required columns, if you select all unwanted columns, this will only consume more server memory and cause the server to slow down at high load or frequency times For example, your table contains columns such as created_at and updated_at and timestamps, and then avoid selecting * because they do not require inefficient query se

Understand ACID properties: The pillars of a reliable database Understand ACID properties: The pillars of a reliable database Apr 08, 2025 pm 06:33 PM

Detailed explanation of database ACID attributes ACID attributes are a set of rules to ensure the reliability and consistency of database transactions. They define how database systems handle transactions, and ensure data integrity and accuracy even in case of system crashes, power interruptions, or multiple users concurrent access. ACID Attribute Overview Atomicity: A transaction is regarded as an indivisible unit. Any part fails, the entire transaction is rolled back, and the database does not retain any changes. For example, if a bank transfer is deducted from one account but not increased to another, the entire operation is revoked. begintransaction; updateaccountssetbalance=balance-100wh

How to fill in mysql username and password How to fill in mysql username and password Apr 08, 2025 pm 07:09 PM

To fill in the MySQL username and password: 1. Determine the username and password; 2. Connect to the database; 3. Use the username and password to execute queries and commands.

How to copy and paste mysql How to copy and paste mysql Apr 08, 2025 pm 07:18 PM

Copy and paste in MySQL includes the following steps: select the data, copy with Ctrl C (Windows) or Cmd C (Mac); right-click at the target location, select Paste or use Ctrl V (Windows) or Cmd V (Mac); the copied data is inserted into the target location, or replace existing data (depending on whether the data already exists at the target location).

See all articles