duanqiao1947 2016-10-29 01:07
浏览 153
已采纳

PHP在检查之前是否已转义

In PHP, do I need to escape form submissions before I check if they're empty?

i.e. would something such as empty($_POST['email']) be vulnerable to code injection, or not?

  • 写回答

1条回答 默认 最新

  • drxyaox153896 2016-10-29 01:44
    关注

    OWASP site (https://www.owasp.org/index.php/Code_Injection) define code injection as

    Code Injection is the general term for attack types which consist of injecting code that is then interpreted/executed by the application.

    PHP empty function determines if a variable is empty or not. Since it is not really executing the code, it is safe.

    What you do after empty matters? For example, if you plan to use the $_POST['email'] as part of the SQL query or use it in an external shell command or using it in an HTML output, you need to escape it accordingly. Depending on the usage, there are escaping functions. For SQL injections, PHP provides mysql_real_escape_string. For shell command, escapeshellcmd and escapeshellarg. For HTML output to avoid XSS attacks, PHP htmlentities.

    本回答被题主选为最佳回答 , 对您是否有帮助呢?
    评论

报告相同问题?

悬赏问题

  • ¥15 shape_predictor_68_face_landmarks.dat
  • ¥15 slam rangenet++配置
  • ¥15 有没有研究水声通信方面的帮我改俩matlab代码
  • ¥15 对于相关问题的求解与代码
  • ¥15 ubuntu子系统密码忘记
  • ¥15 信号傅里叶变换在matlab上遇到的小问题请求帮助
  • ¥15 保护模式-系统加载-段寄存器
  • ¥15 电脑桌面设定一个区域禁止鼠标操作
  • ¥15 求NPF226060磁芯的详细资料
  • ¥15 使用R语言marginaleffects包进行边际效应图绘制