Jump to content

Recommended Posts

Just a quick question...

 

If I use htmlspecialchars on a user text input before storing into a database, then when showing the data in an output use htmlspecialchars_decode before displaying, would that allow potentially harmful code to be run? (ie is it only a good way to store the data not display it?)

What type of potentially harmful code are you trying to prevent?

 

SQL Injection, XSS Exploits ???

 

If you are only worried about sql injection  www.php.net/mysql_real_escape_string works.

 

If you are worried about XSS, I am sure it will, if you have not done so try storing this and dispalying it on the page:

 

$xss = "<script>alert('XSStest');</script>";

 

If you can see the alert display on the page, than it is not preventing any type of XSS exploit.

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.