Florian Weimer <[EMAIL PROTECTED]> writes:

>> db_query uses sprintf to replace placeholder expressions if passed
>> more than one argument and it seems to me that using %s does the
>> same thing as PHP's string expansion as in 4.5.3.
>
> What about SQL injection? Doesn't db_query protect against it, while
> PHP's string expansion doesn't?

At second glance, it does seem like it: db_query performs quoting on
those arguments which are then added via snprintf().

Do you have any idea how the $key parameter to sess_destroy
(includes/session.inc) is generated?

Cheers,
-Hilko who is once again shocked how little he knows about PHP's
       internal magic


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to