Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:3901 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 63527 invoked by uid 1007); 14 Aug 2003 07:41:57 -0000 Message-ID: <20030814074156.63525.qmail@pb1.pair.com> To: internals@lists.php.net References: <200308071447.03285.ilia@prohost.org> <20030814072704.49157.qmail@pb1.pair.com> Date: Thu, 14 Aug 2003 10:41:16 +0200 Lines: 19 MIME-Version: 1.0 Content-Type: text/plain; charset="Iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Newsreader: Microsoft Outlook Express 6.00.2720.3000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2727.1300 X-Posted-By: 212.199.103.105 Subject: Re: [PHP-DEV] Re: PHP 4.3.3RC3 Released From: mosdoron@netvision.net.il ("moshe doron") "Derick Rethans" wrote in message news:Pine.LNX.4.53.0308140932320.12247@jdi.jdimedia.nl... > On Thu, 14 Aug 2003, moshe doron wrote: > > > What about hacking somehow the sqlite library to disallow chained queries > > (or at least do it optionally)? > > > > This behavior is *huge* security hole, allow to the cracker drop ur database > > using simple select where query. > > How is this a security hole? http://www.phpbuilder.com/mail/php-developer-list/2003022/0062.php moshe