Input sanitization for database interaction in zend framework -


In such commands in the Zend Framework

$ mapperObject-> FetchAll ($ where, $ order, $ count, offset offset);

Should anyone keep in mind what is in the variable or will the ZF pay attention to the SFG injection?

Assuming this is the standard Zend_Db_Table-> FetchAll is using , you are actually secured with SQL injection unless you have your parameters like:

  $ where = $ select- & gt; Where ('id =?', $ Id) use safe methods to make; // or .. $ where = $ select- & gt; Where ('id =: id');   

and not

  $ where = $ select- & gt; Where ('id = $ id');    

Comments

Popular posts from this blog

mysql - BLOB/TEXT column 'value' used in key specification without a key length -

c# - Using Vici cool Storage with monodroid -

python - referencing a variable in another function? -