SQL injection (bug #30274)

git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@169530 c90b9560-bf6c-de11-be94-00142212c4b1
This commit is contained in:
Jakub Vrana 2004-09-29 11:52:42 +00:00
parent 3808af7f18
commit 64d1c6bfd4

View file

@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
<!-- $Revision: 1.16 $ -->
<!-- $Revision: 1.17 $ -->
<!-- splitted from ./en/functions/mysql.xml, last change in rev 1.100 -->
<refentry id="function.mysql-real-escape-string">
<refnamediv>
@ -88,7 +88,7 @@ mysql_query($query);
// We didn't check $_POST['password'], it could be anything the user wanted! For example:
$_POST['username'] = 'aidan';
$_POST['password'] = "' OR 1=1";
$_POST['password'] = "' OR ''='";
// This means the query sent to MySQL would be:
echo $query;