Fix SQL injection in login using prepared statements part 2
This commit is contained in:
parent
75f47a76b0
commit
f94a1ebbd5
@ -26,7 +26,8 @@ if ($_SERVER["REQUEST_METHOD"] === "POST") {
|
|||||||
// }
|
// }
|
||||||
require_once __DIR__ . "/config.php";
|
require_once __DIR__ . "/config.php";
|
||||||
|
|
||||||
// Use a prepared statement to prevent SQL injection.
|
// SQL injection mitigation: use a prepared statement with bound parameters.
|
||||||
|
// User input is treated strictly as data, not as part of the SQL syntax.
|
||||||
$stmt = $conn->prepare("SELECT id FROM login_users WHERE username = ? AND password = ?");
|
$stmt = $conn->prepare("SELECT id FROM login_users WHERE username = ? AND password = ?");
|
||||||
|
|
||||||
if ($stmt === false) {
|
if ($stmt === false) {
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user