I had this discussion with a high reputation PHP guy:
PDO has no use here. as well as mysql_real_escape_string. extremely poor quality.
This of course is cool, but I honestly don't know what's wrong with suggesting use of mysql_real_escape_string
or PDO to fix this code:
<script type="text/javascript">
var layer;
window.location.href = "example3.php?layer="+ layer;
<?php
//Make a MySQL connection
$query = "SELECT Category, COUNT(BUSNAME)
FROM ".$_GET['layer']." GROUP BY Category";
$result = mysql_query($query) or die(mysql_error());
Into this
$layer = mysql_real_escape_string($_GET['layer']);
$query = "SELECT Category, COUNT(BUSNAME)
FROM `".$layer."` GROUP BY Category";
, considering that the JavaScript code gets send client-side.
Put them in a (Hash)Map. And do no validate that the table name is correct before concatenating strings. Instead, select one of the prebuilt, inherently safe, statements based on the user-generated entry. That way, nothing user-generated gets concatenated to your statement.
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. The developer must sanitize all input, not only web form inputs such as login forms.
Your advice is indeed incorrect.
mysql_real_escape_string()
will not work for dynamic table names; it is designed to escape string data, delimited by quotes, only. It will not escape the backtick character. It's a small but crucial distinction.
So I could insert a SQL injection in this, I would just have to use a closing backtick.
PDO does not provide sanitation for dynamic table names, either.
This is why it is good not to use dynamic table names, or if one has to, comparing them against a list of valid values, like a list of tables from a SHOW TABLES
command.
I wasn't really fully aware of this either, and probably guilty of repeating the same bad advice, until it was pointed out to me here on SO, also by Col. Shrapnel.
For the record, here's sample code for fixing this hole.
$allowed_tables = array('table1', 'table2');
$clas = $_POST['clas'];
if (in_array($clas, $allowed_tables)) {
$query = "SELECT * FROM `$clas`";
}
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With