Re: Avoiding SQL injection in Dynamic Queries (in plpgsql) - Mailing list pgsql-general

From Pavel Stehule
Subject Re: Avoiding SQL injection in Dynamic Queries (in plpgsql)
Date
Msg-id 162867791003170353l309ffcd1l707174ed45fb35da@mail.gmail.com
Whole thread Raw
In response to Avoiding SQL injection in Dynamic Queries (in plpgsql)  (Allan Kamau <kamauallan@gmail.com>)
List pgsql-general
2010/3/17 Allan Kamau <kamauallan@gmail.com>:
> When writing dynamic commands (those having "EXECUTE 'some SQL
> query';), is there a way to prevent interpretation of input parameters
> as pieces of SQL commands? Does quote_literal() function implicitly
> protect against this unwanted behaviour.

quote_literal, quote_identif are enough, but USING clause is better
and faster. Sometimes you have to use a combination:

execute 'select foo from ' || tabname::regclass || ' WHERE a = $1' USING value;

Pavel



>
> Allan.
>
> --
> Sent via pgsql-general mailing list (pgsql-general@postgresql.org)
> To make changes to your subscription:
> http://www.postgresql.org/mailpref/pgsql-general
>

pgsql-general by date:

Previous
From: Herouth Maoz
Date:
Subject: Re: stopping processes, preventing connections
Next
From: zhong ming wu
Date:
Subject: Re: return row from plpgsql?