Guest User

Untitled

a guest
Aug 11th, 2018
108
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.71 KB | None | 0 0
  1. Is PHP's addslashes vulnerable to sql injection attack?
  2. $user = addslashes($_POST['user']);
  3. $pass = sha1($_POST['pass']);
  4. $sql = "SELECT * FROM admins WHERE user = '".$user."' AND `pass` = '".$pass."'";
  5.  
  6. $nums = mysql_num_rows(mysql_query($sql));
  7.  
  8. if($nums==1){
  9. $_SESSION['admin_user'] = $user;
  10. $_SESSION['admin_pass'] = $pass;
  11.  
  12. "SELECT * FROM admins WHERE id = $id"
  13.  
  14. "SELECT * FROM admins WHERE id = 1 OR 1=1"
  15.  
  16. Example #1 An addslashes() example
  17. <?php
  18. $str = "Is your name O'reilly?";
  19.  
  20. // Outputs: Is your name O'reilly?
  21. echo addslashes($str);
  22.  
  23. $query = sprintf("SELECT `username`,`password`
  24. FROM admins
  25. WHERE user = '%s'
  26. AND `pass` = '%s'",
  27. $user, $pass);
Add Comment
Please, Sign In to add comment