Hello Gary,

Thanks for reporting this.

Gary wrote:
> 
> I'm not sure of whether this bug is specific to Jyve in general, or just
> the current implementation of it on locus.apache.org,

Jyve in general, from looking at the code here:

http://www.working-dogs.com/jyve/cvsweb/index.cgi/jyve/src/java/org/apache/jyve/screens/SearchResults.java?rev=1.6&content-type=text/x-cvsweb-markup

Here's a simple idea for a fix; is this too expensive/clumsy?  Note: not
a patch or a diff yet, just seeking feedback...

 private String removeChars(String s)
    {
        /**
         *Remove punctuation, regexp chars, etc. from the string.
         */
        char[] REMOVE_CHAR = { '!' , '#' , '$' , '%' , '&' , '\'' ,
                               '(' , ')' , '*' , '+' , ',' ,
                               '-' , '.' , '/' , ':' , ';' , '<' ,
                               '=' , '.' , '?' , '@' , '[' , '\\' ,
                               ']' , '^' , '_' , '`' , '{' , '|' ,
                               '}' , '~' };

        for (int i = 0; i < REMOVE_CHAR.length; i++)
            s = s.replace(REMOVE_CHAR[i],' ');
        s = s.trim();
        return s;
    }

> 
> This can probably be abused to get unauthorized access to the MySQL database.

I don't understand how that would work, can you elaborate?

Regards,
~Eric

--
--------------------------------------------------------------
To subscribe:        [EMAIL PROTECTED]
To unsubscribe:      [EMAIL PROTECTED]
Archives and Other:  <http://java.apache.org/main/mail.html>
Problems?:           [EMAIL PROTECTED]

Reply via email to