"If a worker wants to do his job well, he must first sharpen his tools." - Confucius, "The Analects of Confucius. Lu Linggong"
Front page > Programming > Is `mysqli_real_escape_string()` Enough to Prevent SQL Injection Attacks?

Is `mysqli_real_escape_string()` Enough to Prevent SQL Injection Attacks?

Posted on 2025-02-11
Browse:128

Is `mysqli_real_escape_string()` Enough to Prevent SQL Injection Attacks?

Is MySQLi's "mysqli_real_escape_string" Sufficient Against SQL Attacks?

Your code attempts to protect against SQL injections using "mysqli_real_escape_string()". However, as indicated by uri2x, this measure is inadequate.

Vulnerability to SQL Injection

"mysqli_real_escape_string()" only escapes certain characters, leaving your query vulnerable to SQL injection attacks. For example, the following code could still be vulnerable:

$email = mysqli_real_escape_string($db_con, $_POST['email']);
$query = "SELECT * FROM users WHERE email = '" . $email . "'";

An attacker could input an email address like "email'@example.com" to exploit the query, adding additional SQL statements after the escaped input.

Use of Prepared Statements

Instead of "mysqli_real_escape_string()", the most effective way to prevent SQL injections is to employ prepared statements. Prepared statements separate data from the query string, preventing data contamination.

$stmt = $db_con->prepare("INSERT INTO users (email, psw) VALUES (?, ?)");
$stmt->bind_param('ss', $email, $psw);
$email = mysqli_real_escape_string($db_con, $_POST['email']);
$psw = mysqli_real_escape_string($db_con, $_POST['psw']);
$stmt->execute();

Strict Character Whitelisting

In situations where prepared statements are not feasible, implementing a strict character whitelist can guarantee security. This involves filtering input to ensure it only contains allowed characters.

Conclusion

"mysqli_real_escape_string()" alone is insufficient to protect against SQL injections. Prepared statements and strict whitelisting provide more robust safeguards against these attacks.

Latest tutorial More>

Disclaimer: All resources provided are partly from the Internet. If there is any infringement of your copyright or other rights and interests, please explain the detailed reasons and provide proof of copyright or rights and interests and then send it to the email: [email protected] We will handle it for you as soon as possible.

Copyright© 2022 湘ICP备2022001581号-3