southbeach
Programmer
This is what I have in place:
(1) MySQL Database
(2) User must log in
(3) Ajax calls to validate all form submissions
(4) POST method
(5) Each time ajax call is made, $_SESSION is referenced to validate user
(6) JQuery is used as front end
(7) DB name, host, user and password is kept in a PHP script which is included as needed
(8) I am using a "procedural" approach to interact with Database
(9) I use mysqli
(10) Every DB query uses mysqli_real_escape_string()
(11) I use $_POST values in mysqli_real_escape_string()
(12) I escape every form input prior to sending data to PHP
(13) PHP sends data back in JSON or plain text with a predetermined field separator which I then reference to "split" the returned data
(14) Site where application is based, will use SSL
(15) pending to incorporate use of strip_tag() in DB queries
What am I missing? Where am I exposed? How can I test and make sure I'm secured?
Thank you all for reading through this lengthly post and for your continuous help!
--
SouthBeach
The good thing about not knowing is the opportunity to learn - Yours truly, 2008.
(1) MySQL Database
(2) User must log in
(3) Ajax calls to validate all form submissions
(4) POST method
(5) Each time ajax call is made, $_SESSION is referenced to validate user
(6) JQuery is used as front end
(7) DB name, host, user and password is kept in a PHP script which is included as needed
(8) I am using a "procedural" approach to interact with Database
(9) I use mysqli
(10) Every DB query uses mysqli_real_escape_string()
(11) I use $_POST values in mysqli_real_escape_string()
(12) I escape every form input prior to sending data to PHP
Code:
var param='name='+escape( $('#name').val() );
Code:
var response=ajax_response.split('~');
(15) pending to incorporate use of strip_tag() in DB queries
What am I missing? Where am I exposed? How can I test and make sure I'm secured?
Thank you all for reading through this lengthly post and for your continuous help!
--
SouthBeach
The good thing about not knowing is the opportunity to learn - Yours truly, 2008.