2014-09-13 59 views
0

我聽說我可以通過使用參數化查詢來防止SQL注入攻擊,但我不知道如何編寫它們。如何將SQL查詢重寫爲參數化查詢?

我該如何將以下內容寫入參數化查詢?

SqlConnection con = new SqlConnection(
    "Data Source=" + globalvariables.hosttxt + "," + globalvariables.porttxt + "\\SQLEXPRESS;" + 
    "Database=ha;" + 
    "Persist Security Info=false;" + 
    "UID='" + globalvariables.user + "';" + 
    "PWD='" + globalvariables.psw + "'"); 

string query = "SELECT distinct ha FROM app WHERE 1+1=2"; 

if (comboBox1.Text != "") 
{ 
    query += " AND firma = '" + comboBox1.Text + "'"; 
} 

if (comboBox2.Text != "") 
{ 
    query += " AND type = '" + comboBox2.Text + "'"; 
} 

if (comboBox3.Text != "") 
{ 
    query += " AND farve = '" + comboBox3.Text + "'"; 
} 

SqlCommand mySqlCmd = con.CreateCommand(); 
mySqlCmd.CommandText = query; 

con.Open(); 
… 

回答

2

您需要使用參數,而不僅僅是串聯起來你的SQL:

using (SqlConnection con = new SqlConnection(--your-connection-string--)) 
using (SqlCommand cmd = new SqlCommand(con)) 
{ 
    string query = "SELECT distinct ha FROM app WHERE 1+1=2"; 

    if (comboBox1.Text != "") 
    { 
     // add an expression with a parameter 
     query += " AND firma = @value1 "; 

     // add parameter and value to the SqlCommand 
     cmd.Parameters.Add("@value1", SqlDbType.VarChar, 100).Value = comboBox1.Text; 
    } 

    .... and so on for all the various parameters you want to add 

    cmd.CommandText = query; 

    con.Open(); 

    using (SqlDataReader reader = cmd.ExecuteReader()) 
    { 
     while(reader.Read()) 
     { 
      // do something with reader -read values 
     } 

     reader.Close(); 
    } 

    con.Close(); 
} 
0

,而不是comboBox1.Text使用參數,如@firma

command.Parameters.Add("@firma", SqlDbType.Varchar); 
command.Parameters["@firma"].Value = comboBox1.Text; 

query += " AND firma = @firma "; 

將此所有參數

+0

@marc_s謝謝錯字 – 2014-09-13 08:24:08

+0

OK - 現在作爲下一步,我建議你總是定義一個明確的** **長:'command.Parameters.Add( 「@ FIRMA」,SqlDbType.Varchar,100);' – 2014-09-13 08:26:40

+0

由於這是有查詢執行計劃中的任何差異?或性能? – 2014-09-13 08:53:15