duanqiao1947 2016-10-29 01:07
浏览 153
已采纳

PHP在检查之前是否已转义

In PHP, do I need to escape form submissions before I check if they're empty?

i.e. would something such as empty($_POST['email']) be vulnerable to code injection, or not?

  • 写回答

1条回答 默认 最新

  • drxyaox153896 2016-10-29 01:44
    关注

    OWASP site (https://www.owasp.org/index.php/Code_Injection) define code injection as

    Code Injection is the general term for attack types which consist of injecting code that is then interpreted/executed by the application.

    PHP empty function determines if a variable is empty or not. Since it is not really executing the code, it is safe.

    What you do after empty matters? For example, if you plan to use the $_POST['email'] as part of the SQL query or use it in an external shell command or using it in an HTML output, you need to escape it accordingly. Depending on the usage, there are escaping functions. For SQL injections, PHP provides mysql_real_escape_string. For shell command, escapeshellcmd and escapeshellarg. For HTML output to avoid XSS attacks, PHP htmlentities.

    本回答被题主选为最佳回答 , 对您是否有帮助呢?
    评论

报告相同问题?

悬赏问题

  • ¥15 c语言怎么用printf(“\b \b”)与getch()实现黑框里写入与删除?
  • ¥20 怎么用dlib库的算法识别小麦病虫害
  • ¥15 华为ensp模拟器中S5700交换机在配置过程中老是反复重启
  • ¥15 java写代码遇到问题,求帮助
  • ¥15 uniapp uview http 如何实现统一的请求异常信息提示?
  • ¥15 有了解d3和topogram.js库的吗?有偿请教
  • ¥100 任意维数的K均值聚类
  • ¥15 stamps做sbas-insar,时序沉降图怎么画
  • ¥15 买了个传感器,根据商家发的代码和步骤使用但是代码报错了不会改,有没有人可以看看
  • ¥15 关于#Java#的问题,如何解决?