mirror of
https://github.com/sigmasternchen/php-doc-en
synced 2025-03-15 08:28:54 +00:00
Typos
git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@347660 c90b9560-bf6c-de11-be94-00142212c4b1
This commit is contained in:
parent
cffb5f5289
commit
958d584198
2 changed files with 4 additions and 4 deletions
|
@ -301,7 +301,7 @@ $handle = fopen("c:\\folder\\resource.txt", "r");
|
|||
<row>
|
||||
<entry>7.0.16, 7.1.2</entry>
|
||||
<entry>
|
||||
The <literal>'e'</literal> option were added.
|
||||
The <literal>'e'</literal> option was added.
|
||||
</entry>
|
||||
</row>
|
||||
<row>
|
||||
|
|
|
@ -303,11 +303,11 @@ $query = "UPDATE usertable SET pwd='$pwd' WHERE uid='$uid';";
|
|||
]]>
|
||||
</programlisting>
|
||||
</example>
|
||||
But a malicious user sumbits the value
|
||||
But if a malicious user submits the value
|
||||
<literal>' or uid like'%admin%</literal> to <varname>$uid</varname> to
|
||||
change the admin's password, or simply sets <varname>$pwd</varname> to
|
||||
<literal>hehehe', trusted=100, admin='yes</literal> to gain more
|
||||
privileges. Then, the query will be twisted:
|
||||
privileges, then, the query will be twisted:
|
||||
<informalexample>
|
||||
<programlisting role="php">
|
||||
<![CDATA[
|
||||
|
@ -326,7 +326,7 @@ $query = "UPDATE usertable SET pwd='hehehe', trusted=100, admin='yes' WHERE
|
|||
</informalexample>
|
||||
</para>
|
||||
<para>
|
||||
A frightening example how operating system level commands can be accessed
|
||||
A frightening example of how operating system level commands can be accessed
|
||||
on some database hosts.
|
||||
<example>
|
||||
<title>Attacking the database hosts operating system (MSSQL Server)</title>
|
||||
|
|
Loading…
Reference in a new issue