Add to cart SQL injection
-
Today, someone trying to inject SQL code via GET request:
https://mysite.com/?add-to-cart=50181111111111111%27%20UNION%20SELECT%20CHAR(45,120,49,45,81,45),CHAR(45,120,50,45,81,45)...
My site was shutdown due DDos attack. So I decide, it would be great if ?add-to-cart request have some limits. For example, use regex to filter non-numerical values and set range from existing ID’s (1-999999).
How can I edit ?add-to-cart request?
Viewing 3 replies - 1 through 3 (of 3 total)
Viewing 3 replies - 1 through 3 (of 3 total)
- The topic ‘Add to cart SQL injection’ is closed to new replies.