Jump to content

Recommended Posts

I've designed a simple form and scripted some PHP without any of the recommended security measures one normally employs to prevent SQL injection attacks.  My aim in this was to experiment with SQL injection as I had never really understood it.  Much to my chagrin, all of my injections seemed to have been escaped without my knowledge!  I did some reading and found that a setting in my php.ini file escaped all of the input, magic_quotes_gpc.

 

Now, my question is this:  Just how effective is magic_quotes_gpc at preventing SQL injection attacks?  Given my limited knowledge of the field, I figured I'd ask the experts (every forum has at least two).

 

Thanks for any help you can lend.

Personally, i hate the entire concept of magic_quotes. As far as i'm concerned, something shouldn't happen to data from the user without me doing something to it. It seems to me that magic_quotes can always leed to annoyances with slashes too.

 

I feel that that magic_quotes was an attempt to "mollycoddle" developers to make sure they were producing safe code.

 

I guess the php developers must agree with some of that, since that magic_quotes setting is being taken out of php 6. Given that, i would suggest learning to develop without magic_quotes, althuogh if you were producing something for use on other servers, you would of course need to check for the setting being on.

 

I suppose that didn't really answer your question, but thats my 2 cents(or should i say pence, being english?) on the subject.

While your post did not answer my question, it does provide some helpful insight.  I've never personally encountered an issue with magic_quotes_gpc, but I can understand that perhaps it might.

 

I will try to follow your advice and develop without the magic_quotes_gpc crutch.

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.