SQL security to prevent attacks

Here are some sample codes to be used on different situations to prevent hacking. SQL vulnerability issues are not discussed here but we will be adding them shortly.

In PHP if some variables are taken from query string and used inside one mysql query then the variables are to be sanitized ( checked ) first before using.

Allowing only numeric data

When we don't expect any thing other than a numeric value then why not to check the variable by using is_numeric PHP function and terminate the program if data is not a number. Here is a sample code for this.

echo "Data Error";
exit; }

Allowing array of numeric numbers or integers

We may use an array like [5,7,4,1] which consist of numbers only. Here we will not allow other than numbers. So something like [5,7,4,a,1] is not allowed. We used split command to create an array from a string then checked each element by looping and displaying each element. If any element is not integer than we will exit the script saying data error.
$cat_id="2,3,a"; // For testing this page only. 
$mn=split(",",$cat_id); // creating array
while (list ($key, $val) = each ($mn)) {
//echo "$key -> $val <br>"; // display elements if you want
if(!is_numeric($val)){ // checking each element
echo "Data Error ";

Check only if it is available

If we are not sure the varialble $start is available or not then we can use this to check 'if it is available then it must be a number'.
if(strlen($start) > 0 and !is_numeric($start)){
echo "Data Error";

Allowing only alphanumeric characters

If we expect only alphanumeric characters then we can use ctype_alnum function.
echo "Data Error";
exit; }

Allow only Chars Numbers and space

if(!preg_match('/^[a-z0-9\s]+$/i', $t1)){
echo "Data Error ";
We can change above code to allow dashr dot or under score( - or . _ )
if(!preg_match('/^[a-z0-9\s.\- \_]+$/i', $t1)){
echo "Data Error ";

Remove quotes or escape from query

Hackers can inject additional queries by using UNION command to an existing query, particularly when we are getting user submitted data like login id and password in our sql statement. To avoid this we can sanitize the variables before using them inside our query. Here is one example how to check userid before using.




its very use full


the resources here are useful...thanhs


Well its really gud.......but it should b more comprehensive.
Ali Mohamed Omar


the resources here are useful...thanhs


thank you - this will help


Nice one..


its very use full thanks for posting.......


Thanks for the info. Very useful

Post your comments , suggestion , error , requirements etc here .

SQL Video Tutorials

We use cookies to improve your browsing experience. . Learn more
HTML MySQL PHP JavaScript ASP Photoshop Articles FORUM . Contact us
©2000-2021 plus2net.com All rights reserved worldwide Privacy Policy Disclaimer