git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@347660 c90b9560-bf6c-de11-be94-00142212c4b1
This commit is contained in:
George Peter Banyard 2019-06-25 15:42:46 +00:00
parent cffb5f5289
commit 958d584198
2 changed files with 4 additions and 4 deletions

View file

@ -301,7 +301,7 @@ $handle = fopen("c:\\folder\\resource.txt", "r");
<row>
<entry>7.0.16, 7.1.2</entry>
<entry>
The <literal>'e'</literal> option were added.
The <literal>'e'</literal> option was added.
</entry>
</row>
<row>

View file

@ -303,11 +303,11 @@ $query = "UPDATE usertable SET pwd='$pwd' WHERE uid='$uid';";
]]>
</programlisting>
</example>
But a malicious user sumbits the value
But if a malicious user submits the value
<literal>' or uid like'%admin%</literal> to <varname>$uid</varname> to
change the admin's password, or simply sets <varname>$pwd</varname> to
<literal>hehehe', trusted=100, admin='yes</literal> to gain more
privileges. Then, the query will be twisted:
privileges, then, the query will be twisted:
<informalexample>
<programlisting role="php">
<![CDATA[
@ -326,7 +326,7 @@ $query = "UPDATE usertable SET pwd='hehehe', trusted=100, admin='yes' WHERE
</informalexample>
</para>
<para>
A frightening example how operating system level commands can be accessed
A frightening example of how operating system level commands can be accessed
on some database hosts.
<example>
<title>Attacking the database hosts operating system (MSSQL Server)</title>