Possible Duplicate:
Best way to stop SQL Injection in PHP
I have seen some of examples that use something called a PDO to make a query safe from sql-infection, or others that use real_escape, but they all seem to be incomplete or assume some knowledge. So I ask, take this simple update query and make it safe from sql-injection.
function updateUserName($id,$first,$last)
{
$qry = 'UPDATE user SET first = "'.$first.'", last = "'.$last.'" WHERE id = '.$id;
mysql_query($qry) or die(mysql_error());
}
Basically, you have to :
mysql_real_escape_stringintval.Which, in your specific case, would give something like this :
Of course, this is considering that
lastandfirstare varchar, and thatidis an integer.As a sidenote : when an SQL error (this is also true for whatever kind of error you can thing about) occurs, you should not display a technical error message and just let the script die.
Your users will not understand that technical error message — they won’t know what to do with it, and it’s not their problem.
Instead, you should log (to a file, for instance) that technical error message, for your own usage ; and display a nice “oops an error occured” page to the user.