mirror of
https://github.com/sigmasternchen/php-doc-en
synced 2025-03-15 08:28:54 +00:00
Move mysqli SQL injection warning to a snippet (#703)
This commit is contained in:
parent
eedb233402
commit
3d34df4084
4 changed files with 10 additions and 25 deletions
|
@ -1676,6 +1676,13 @@ linkend="book.mysqlnd">mysqlnd</link>.'>
|
|||
hand-shake/authentication, which mysqlnd will use.</para><para>Libmysqlclient uses the default charset set in the
|
||||
<filename>my.cnf</filename> or by an explicit call to <function>mysqli_options</function> prior to
|
||||
calling <function>mysqli_real_connect</function>, but after <function>mysqli_init</function>.</para></note>'>
|
||||
<!ENTITY mysqli.sqlinjection.warning '<warning xmlns="http://docbook.org/ns/docbook">
|
||||
<title>Security warning: SQL injection</title><para>If the query contains any variable
|
||||
input then <link linkend="mysqli.quickstart.prepared-statements">parameterized
|
||||
prepared statements</link> should be used instead. Alternatively, the
|
||||
data must be properly formatted and all strings must be escaped using
|
||||
the <function>mysqli_real_escape_string</function>
|
||||
function.</para></warning>'>
|
||||
|
||||
<!-- Notes for SAPI/Apache -->
|
||||
<!ENTITY apache.req.module '<simpara xmlns="http://docbook.org/ns/docbook">This function is supported when PHP
|
||||
|
|
|
@ -42,9 +42,7 @@
|
|||
<para>
|
||||
The query, as a string.
|
||||
</para>
|
||||
<para>
|
||||
Data inside the query should be <link linkend="mysqli.real-escape-string">properly escaped</link>.
|
||||
</para>
|
||||
&mysqli.sqlinjection.warning;
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
|
|
@ -77,17 +77,7 @@
|
|||
<para>
|
||||
The query string.
|
||||
</para>
|
||||
<warning>
|
||||
<title>Security warning: SQL injection</title>
|
||||
<para>
|
||||
If the query contains any variable input then
|
||||
<link linkend="mysqli.quickstart.prepared-statements">parameterized
|
||||
prepared statements</link> should be used instead. Alternatively, the
|
||||
data must be properly formatted and all strings must be escaped using
|
||||
the <function>mysqli_real_escape_string</function>
|
||||
function.
|
||||
</para>
|
||||
</warning>
|
||||
&mysqli.sqlinjection.warning;
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
|
|
|
@ -42,17 +42,7 @@
|
|||
<para>
|
||||
The query string.
|
||||
</para>
|
||||
<warning>
|
||||
<title>Security warning: SQL injection</title>
|
||||
<para>
|
||||
If the query contains any variable input then
|
||||
<link linkend="mysqli.quickstart.prepared-statements">parameterized
|
||||
prepared statements</link> should be used instead. Alternatively, the
|
||||
data must be properly formatted and all strings must be escaped using
|
||||
the <function>mysqli_real_escape_string</function>
|
||||
function.
|
||||
</para>
|
||||
</warning>
|
||||
&mysqli.sqlinjection.warning;
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
|
Loading…
Reference in a new issue