ice78991
Programmer
- Nov 20, 2006
- 216
When passing query parameters in a url, what is the best way to protect against people adding malicious sql commands to the url. I am aware that <cfqueryparam> offers some protection but if you need to set the maxlength to say 20 and you are passing a CF_SQL_VARCHAR it seems that malicious commands could still be tacked on.
Is it common practice to run an additional check of the passed url value before using it in the query (scanning the url variable for words such as 'drop' or for inclusion of semi-colons etc) ?
Is it common practice to run an additional check of the passed url value before using it in the query (scanning the url variable for words such as 'drop' or for inclusion of semi-colons etc) ?