Home >Backend Development >PHP Tutorial >How Does mysql_real_escape_string() Surpass addslashes() in Combatting SQL Injection?
While addslashes() serves the purpose of escaping special characters, it falls short in providing comprehensive protection against SQL injection attacks. In contrast, mysql_real_escape_string() offers enhanced security by addressing a broader range of problematic characters.
Specifically, mysql_real_escape_string() adds slashes to the following characters:
\x00, \n, \r, \, ', " and \x1a.
This enhanced character set ensures that not only single and double quotes are escaped, as with addslashes(), but also other potentially malicious characters are neutralized.
To illustrate this difference, consider the following example:
$string = "' OR 1=1"; $addslashes_example = addslashes($string); // Escapes only single and double quotes $mysql_rescape_example = mysql_real_escape_string($string); // Escapes single, double, and \x1a characters echo $addslashes_example; // Outputs: \' OR 1=1 echo $mysql_rescape_example; // Outputs: \' OR 1=1\'
As demonstrated, mysql_real_escape_string() provides more robust protection by preventing the execution of a crafted SQL injection attack, whereas addslashes() leaves the system vulnerable. It is crucial to acknowledge that both mysql_real_escape_string() and addslashes() have been deprecated and are no longer recommended for use. Instead, parameterized queries should be employed for secure and efficient database interactions.
The above is the detailed content of How Does mysql_real_escape_string() Surpass addslashes() in Combatting SQL Injection?. For more information, please follow other related articles on the PHP Chinese website!