Guest User

Untitled

a guest
Aug 23rd, 2018
113
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.99 KB | None | 0 0
  1. MySQL/ASP Paramaterization To Prevent Injection [closed]
  2. username = Trim(Request("username"))
  3. password = Trim(Request("password"))
  4.  
  5. SQL = " SELECT clientID FROM clientAccounts
  6. WHERE username = '"&username&"'AND password = '"&password&"'; "
  7. Set rs = conn.Execute(SQL)
  8.  
  9. SqlConnection objConnection = new SqlConnection(_ConnectionString);
  10. objConnection.Open();
  11. SqlCommand objCommand = new SqlCommand(
  12. "SELECT * FROM User WHERE Name = @Name AND Password = @Password",
  13. objConnection);
  14. objCommand.Parameters.Add("@Name", NameTextBox.Text);
  15. objCommand.Parameters.Add("@Password", PasswordTextBox.Text);
  16. SqlDataReader objReader = objCommand.ExecuteReader();
  17. if (objReader.Read())
  18. {
  19. ...
  20.  
  21. With oSQLCommand
  22. .ActiveConnection = oSQLConn
  23. .CommandText = "SELECT * FROM whatever WHERE field1=@field1"
  24. 'add input parameters
  25. .Parameters.Append .CreateParameter("field1", adInteger, adParamInput, , iTableIdValue)
  26. End With
  27. 'run the stored procedure
  28. oRS.Open oSQLCommand
Add Comment
Please, Sign In to add comment