Does eliminating dangerous characters avoid SQL-injection?

14,678

Solution 1

To be able to inject arbitrary SQL from the context of a string literal, that string literal needs to be left. This is only possible by introducing a string end delimiter, in this case a single ', or by expand the a string literal to a preceding ', e.g., by using the escapes character \:

$a = '\\';
$b = ' OR 1=1 OR ';
$c = ' --';

$query = "SELECT * FROM t1 WHERE a='$a' AND b='$b' AND c='$c'";
// result:
// SELECT * FROM t1 WHERE a='\' AND b=' OR 1=1 OR ' AND c=' --'
//                          \_________/           \_______/

Now as your function removes any ' and \, it seems to be impossible to leave or expand the string literal and thus not possible to inject arbitrary SQL.

However, since your function does not take the actual character encoding into account, it is possible to exploit this if the MySQL’s character encoding is GBK, similar to how it can be exploited when using addslashes instead of mysql_real_escape_string:

$a = "\xbf";
$b = " OR 1=1 OR ";
$c = " --";

$query = "SELECT * FROM t1 WHERE a='$a' AND b='$b' AND c='$c'";
// result:
// SELECT * FROM t1 WHERE a='縗 AND b=' OR 1=1 OR ' AND c=' --'
//                          \_________/           \_______/

So to play safe, use mysql_real_escape_string or other proven methods to prevent SQL injections.

Solution 2

The very idea of removing whatever characters is utterly wrong.

That's what essentially wrong your approach.

You have to format your SQL literals properly instead of spoiling them.

Imagine this very site were using such a "protection": you'd were unable to post your question!

To answer your question literally - yes, under some circumstances it's very easy to inject. Just because the very idea of all-in-once sanitization is broken. PHP had a similar feature once, called "magic quotes". It was a hard lesson, but now it's got removed from the language at last. For the very reasons I told you:

  • it does not make "data" "secure"
  • it spoils your data instead

Every SQL literal have to be treated personally, according to its role.

Solution 3

Your function doesn't deal with different encodings.

Don't try to come up with sanitation methods yourself, use something already made. In the case of mysql_*, it would be mysql_real_escape_string, however, you shouldn't use mysql_* anymore, use PDO or mysqli instead.

See: How can I prevent SQL injection in PHP? for further details.

Solution 4

Yes, this can be defeated using Unicode characters and manipulating character sets.

See https://security.stackexchange.com/questions/11391/how-did-anonymous-use-utf-16-ascii-to-fool-php-escaping for further details.

Share:
14,678
masoud
Author by

masoud

I am.

Updated on June 04, 2022

Comments

  • masoud
    masoud almost 2 years

    Avoiding SQL-injections there are many ways How to prevent SQL injection in PHP?.

    The question is, how is it possible to sql-inject through removeBadCharacters?

    function removeBadCharacters($s)
    {
       return str_replace(array('&','<','>','/','\\','"',"'",'?','+'), '', $s);
    }
    

    It tries to throw out dangerous characters (the application doesn't need those characters):

    $x = removeBadCharacters($_POST['data']);
    
    mysql_query("insert into table (x) values ('".$x."');");
    
    // or
    
    mysql_query("select * from into where name = '".$x."';"); 
    
  • Your Common Sense
    Your Common Sense almost 11 years
    Sorry, I do not discuss what particular toe you wish to shoot out. You just shouldn't shoot yourself in a leg. Period.
  • Mr Lister
    Mr Lister almost 11 years
    @MM. Inputs with dollar signs?
  • hek2mgl
    hek2mgl almost 11 years
    @MM. The problem is your question and not this answer. You wrote: I wrote it many years ago and I'm not going to change it -> answer, then you'll be vulnerable! use the well known approaches like prepared statements.
  • masoud
    masoud almost 11 years
    @hek2mgl: Yes, it's vulnerable. I'm interested in how?
  • Your Common Sense
    Your Common Sense almost 11 years
    You cannot tell for the whole application but for the 2 given queries only.
  • Gumbo
    Gumbo almost 11 years
    @YourCommonSense This applies to all injection points inside a SQL string literal.
  • Gall Annonim
    Gall Annonim almost 5 years
    stackoverflow.com/questions/5741187/… @deepmax Prepared statements are superior to mysqli_real_escape. Yes, it usually does the job, but it's not as safe as prepared statements.