Hi all,
While going through the code we have found there is lot of code prone to sql injection vulnerability. Eg:
Line 458 of db.inc.php invokes a SQL query built using unvalidated input. This call could allow an attacker to modify the statement's meaning or to execute arbitrary SQL The line no 185 to 188 from users.php has a variable called $_REQUEST['refresh']()
187 $_REQUEST['lang'],$_REQUEST['theme'],$_REQUEST['refresh'],$_REQUEST['user_type'],
whic is sinked with phjp file db.inc.php: on line 458
458 $result=mysql_query(trim($query),$DB['DB']);
There are lots of this kind How do we fix this ?
While going through the code we have found there is lot of code prone to sql injection vulnerability. Eg:
Line 458 of db.inc.php invokes a SQL query built using unvalidated input. This call could allow an attacker to modify the statement's meaning or to execute arbitrary SQL The line no 185 to 188 from users.php has a variable called $_REQUEST['refresh']()
187 $_REQUEST['lang'],$_REQUEST['theme'],$_REQUEST['refresh'],$_REQUEST['user_type'],
whic is sinked with phjp file db.inc.php: on line 458
458 $result=mysql_query(trim($query),$DB['DB']);
There are lots of this kind How do we fix this ?
Comment