Browse Source

Add link to StackOverflow describe vulnerability using multibyte encoding

INADA Naoki 11 năm trước cách đây
mục cha
commit
1fd051484e
1 tập tin đã thay đổi với 2 bổ sung1 xóa
  1. 2 1
      README.md

+ 2 - 1
README.md

@@ -192,7 +192,8 @@ Default:        false
 
 When `interpolateParams` is true, calls to `sql.Db.Query()` and `sql.Db.Exec()` with params interpolates placeholders (`?`) with given params. This reduces roundtrips to database compared with `interpolateParams=false` since it uses prepare, exec and close to support parameters.
 
-NOTE: It make SQL injection vulnerability when connection encoding is multibyte encoding except utf-8 (e.g. cp932).
+NOTE: *This may introduce a SQL injection vulnerability when connection encoding is multibyte encoding except for UTF-8 (e.g. CP932)!*
+(See http://stackoverflow.com/a/12118602/3430118)
 
 ##### `loc`