FileMaker 安全问题
我目前正在使用 FileMaker 及其 PHP API,我必须从网站搜索、插入和更新数据库条目。
我真的只是有一个简单的问题。在使用 FileMaker 数据库时,我是否应该关注任何特定的安全问题,因为我不相信它使用 SQL 作为后端语言,因此不会有 SQL 注入之类的事情。
显然,我会清理 HTML 和任意代码的所有数据,但是除了 FileMaker 之外,还有什么是我应该对 SQL 注入之类的事情感到厌倦的吗?
欢迎所有答案。
I am currently working with FileMaker and their PHP API, and I have to search, insert and update database entries from a website.
I just have a quick question really. Is there any specific security issues I should be concerned about whilst working with the FileMaker Database as I don't believe it uses SQL as a backend language so there would be no SQL Injections and things like that.
Obviously I sanitize all data for HTML and any arbitrary code, but is there anything I should be weary of for things like SQL injections but for FileMaker?
All answers would be welcome.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
FileMaker PHP API 使用 FileMaker Server 的 XML 后端,该后端仅接受已知格式的 GET 和 POST 请求。我认为没有办法发送恶意内容。
可能有一种方法可以绕过 PHP 层并直接访问 XML 后端。如果这是一个问题,则应该在 PHP 和 FileMaker 级别上解决。例如,一种方法是创建一个用于 Web 访问的特殊帐户,并且只向 PHP 应用程序提供密码。 (这意味着您不需要个性化的 Web 访问或有特殊的场景。)如果这不起作用,还有许多其他选项:可以限制对布局和字段的访问,将布局标记为只读,或者使用 FileMaker 脚本进行自定义检查并完全隐藏正在发生的情况。
FileMaker PHP API uses FileMaker Server's XML backend, which only accepts GET and POST requests in known format. I don't think there's a way to send something malicious.
There could be a way to bypass your PHP layer and access the XML backend directly. If this is a problem, it should be solved on both PHP and FileMaker levels. E.g. one way is to create a special account for web access and only give the password to the PHP app. (This implies you don't need personalized web access or have a special scenario for it.) If this doesn't work, there's a number of other options: one can restrict access to layouts and fields, mark layouts as read-only, or use FileMaker scripts to do custom checking and completely hide what is going on.