Waraxe IT Security Portal
Login or Register
December 18, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 158
Members: 0
Total: 158
Full disclosure
[KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities
RansomLordNG - anti-ransomware exploit tool
APPLE-SA-12-11-2024-9 Safari 18.2
APPLE-SA-12-11-2024-8 visionOS 2.2
APPLE-SA-12-11-2024-7 tvOS 18.2
APPLE-SA-12-11-2024-6 watchOS 11.2
APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2
APPLE-SA-12-11-2024-4 macOS Sonoma 14.7.2
APPLE-SA-12-11-2024-3 macOS Sequoia 15.2
APPLE-SA-12-11-2024-2 iPadOS 17.7.3
APPLE-SA-12-11-2024-1 iOS 18.2 and iPadOS 18.2
SEC Consult SA-20241211-0 :: Reflected Cross-Site Scripting in Numerix License Server Administration System Login
St. Poelten UAS | Multiple Vulnerabilities in ORing IAP
SEC Consult SA-20241204-0 :: Multiple Critical Vulnerabilities in Image Access Scan2Net (14 CVE)
Microsoft Warbird and PMP security research - technical doc
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> Is this... ?
Post new topicReply to topic View previous topic :: View next topic
Is this... ?
PostPosted: Tue Jul 27, 2004 5:42 pm Reply with quote
rain
Regular user
Regular user
Joined: Jun 29, 2004
Posts: 12




Code:

$result=mysql_query("SELECT * FROM user WHERE id='$id'",$db);
$row=mysql_fetch_row($result);

titulo("$row[1]");
echo"<p>$row[2]</p>";


Is this vurnable to sql injection? I think it is???
View user's profile Send private message
PostPosted: Fri Aug 13, 2004 12:14 am Reply with quote
Imster
Beginner
Beginner
Joined: Aug 13, 2004
Posts: 3




Quote:
Code:

$result=mysql_query("SELECT * FROM user WHERE id='$id'",$db);
$row=mysql_fetch_row($result);

titulo("$row[1]");
echo"<p>$row[2]</p>";



Is this vurnable to sql injection? I think it is???


It depends on the variable $id, if you are using stripslashes() then your fairly safe (safer than not using it anyway).

Code:

$id = stripslashes($id);

$result=mysql_query("SELECT * FROM user WHERE id='$id'",$db);
$row=mysql_fetch_row($result);

titulo("$row[1]");
echo"<p>$row[2]</p>";


Or if your going to be passing all sorts of variables at different times on different pages...you could make a custom function and include it on all pages where you want to make a variable safe. For example:

Make the file safe_inc.php and put:
Code:

function MakeSafe($sfe)
{
$sfe = stripslashes($sfe);
// add any custom code to make vars safe
return $sfe;
}


Then in the page you want to make safe...add this to the beginning:

Code:

include_once('safe_inc.php');


And then when you want to make a var safe do:
Code:

MakeSafe($variable_name);



I know its a long post to a simple question but I just wanted to show the methods to make vars safe in PHP in case any of you were at all interested. If not then I just wasted a minute of your life..

(Ps hi people im new here)
View user's profile Send private message Visit poster's website
PostPosted: Sun Aug 15, 2004 9:30 pm Reply with quote
madman
Active user
Active user
Joined: May 24, 2004
Posts: 46




Just an addition. Use addslashes instead of stripslashes. Smile
This code can be used to sanitize single- or double-quote regardless of magic quotes in effect:
Code:
function quote_me($str) {
while (preg_match('/\[\'"]?/', $str)) $str = stripslashes($str);
return addslashes($str);
}

$id = "0' OR password<>'";

$id = quote_me($id);
$sql = "SELECT username FROM table WHERE id = '$id'";


Use the previous method (that was called "safe" stripslashes), this is what we got:
Code:
SELECT username FROM table WHERE id = '0' OR password<>''

It will produce a doom! Smile

Using addslashes, the SQL query string would be:
Code:
SELECT username FROM table WHERE id = '0\' OR password=\''

That's what should called S A F E.

_________________
ch88rs,
madman
View user's profile Send private message
PostPosted: Wed Aug 18, 2004 10:55 am Reply with quote
Imster
Beginner
Beginner
Joined: Aug 13, 2004
Posts: 3




heh thanks. Will change my habbit now Embarassed
View user's profile Send private message Visit poster's website
PostPosted: Wed Aug 18, 2004 7:42 pm Reply with quote
madman
Active user
Active user
Joined: May 24, 2004
Posts: 46




To be honest, I never rely on addslashes() function only. Smile

_________________
ch88rs,
madman
View user's profile Send private message
Is this... ?
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds