in reply to Re: Preventing SQL injection attacks: are -T and placeholders not enough?
in thread Preventing SQL injection attacks: are -T and placeholders not enough?

"Incidentally, I have never heard of using -T for taint checking. What is that about?"

Firstly, I am not sure how many times I have told you this, if you are going to update a post, it is better indicate in the post what you have changed.

So to answer your original question, taint checking is well documented, has been discussed in many articles, it is covered in relevant tutorials and super search returns many hits. So once again, reading the documentation should answer your question.

Update: Adding Wins unedited post as suggested by bart:
&#8722; <node id="661296" title="Re: Preventing SQL injection attacks: are + -T and placeholders not enough?" created="2008-01-09 04:55:06" updat +ed="2008-01-09 04:55:06"> <type id="11"> note</type> <author id="304479"> Win</author> &#8722; <data> &#8722; <field name="doctext"> I don't know what database system you are using. However, I would nea +rly always recommend holding your SQL within a stored procedure held +within the database. The stored procedure will not execute unless th +e variables meet the data types set in the stored procedure. It has +other added benefits potentially. <br><br> Incidentally, I have never heard of using -T for taint checking. What + is that about? </field> <field name="root_node"> 661249</field> <field name="parent_node"> 661249</field> </data> </node>
Martin
  • Comment on Re^2: Preventing SQL injection attacks: are -T and placeholders not enough?
  • Download Code