Re: Preventing sql injection

From: Alvaro Herrera <alvherre(at)alvh(dot)no-ip(dot)org>
To: Rick Roman <rick(at)cotse(dot)net>
Cc: pgsql-admin(at)postgresql(dot)org
Subject: Re: Preventing sql injection
Date: 2005-08-10 17:11:08
Message-ID: 20050810171108.GF7871@alvh.no-ip.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-admin

On Wed, Aug 10, 2005 at 10:02:05AM -0700, Rick Roman wrote:
> I have a web application that will allow users to submit comments. The
> database activity consists of a single insert statement into a comments
> table. I want to lock down this operation against sql injection attacks.
> Can someone point me to a discussion of general principles? I've seen
> reference to V3 extended-query protocol. Where is this invoked? Other
> suggestions?

What language are you using?

The general principle is that you have to look user input for certain
chars, such as ' and \, and escape them somehow.

There's another way, which is using new features of the v3 protocol.
One easy way to do that is using PQexecParams() instead of PQexec(), if
you are dealing with C programs.

--
Alvaro Herrera (<alvherre[a]alvh.no-ip.org>)
"In a specialized industrial society, it would be a disaster
to have kids running around loose." (Paul Graham)

In response to

Responses

Browse pgsql-admin by date

  From Date Subject
Next Message Rick Roman 2005-08-10 17:14:30 Re: Preventing sql injection
Previous Message Rick Roman 2005-08-10 17:02:05 Preventing sql injection