in reply to perl SQL injection prevent module
An injection attack results in a valid SQL statement (or multiple valid SQL statements). You can't check a query for an injection attack. Fortunately, there are two ways of sidestepping the problem.
Use bind to specify arguments instead of building the query string from user input.
Alternatively, use $dbh->quote to escape user data when building a query string from user input.
Both of these functions are documented in DBI.
By the way, the name of the language is "Perl", not "PERL".
|
|---|