Linux.com :: Protecting your MySQL database from SQL injection attacks with GreenSQL
This is an article (written by a very clueless person) about GreenSQL which is a tool (written by a very clueless person) that acts as a proxy between an application and a MySQL database which attempts to detect malicious, likely-injected SQL statements.
Do not interpolate strings into your SQL statements.
Then, there are all the hilariously dreadful comments.
"better yet, encode the bloody data before you shove it in there" --AnonymousDo not interpolate strings into your SQL statements.
"Do you honestly think that anybody who doesn't know how to use simple, foolproof SQL-quoting functions is really going to be able to figure out how to correctly set up a package like this?" --AnonymousDo not interpolate strings into your SQL statements.
"Why don't you try to actually learn to secure your code instead of being a lazy (or completely unskilled) administrator? Surely mysql_real_escape_string() isn't too hard to incorporate?" --AnonymousDo not interpolate strings into your SQL statements.
Look, it's simple. Most database interfaces have a function called 'execute' or similar which takes two arguments: a string of SQL with markers like '?' in it, and then a tuple of arguments to be used as the values of those markers.
execute('SELECT * FROM users WHERE name = ? AND email = ?', ("radix", "firstname.lastname@example.org"))Do that. Don't do any of the following:
execute('SELECT * FROM users WHERE name = %s and email = %s' % ("radix", "email@example.com"))
name = "radix";
email = "firstname.lastname@example.org";
execute('SELECT * FROM users WHERE name = $name and email = $email');
String escaping is an absolutely retarded alternative to this. Why would you bother escaping or "encoding" your strings when you can simply use the database API as it was intended, without interpolating strings?
Edit: This concept of passing parameters has nothing at all to do with the "prepared statements" feature of popular databases. This is a much simpler feature. This is not a new feature. This feature is commonly called "bind parameters", and it has been around for decades.
Why do so few people know about this?