![]() |
|
P is for Practical | |
PerlMonks |
Re: Avoid SQL injectionby Corion (Patriarch) |
on Jan 20, 2023 at 11:49 UTC ( #11149722=note: print w/replies, xml ) | Need Help?? |
Avoiding SQL injection is simple. Use DBI placeholders. Instead of concatenating your values into your string, put ? there, and then place the values in ->execute(...). You have structured your code around concatenating strings, so I would first replace the sqlSelect</p> with something like:
... and then use that routine like:
In Section
Seekers of Perl Wisdom
|
|