W dniu 24 lutego 2010 22:32 użytkownik Michał Piotrowski
<mkkp...@gmail.com> napisał:
> 2010/2/24 roko <gargamel...@gmail.com>:
>> I found that on backend admin modules generated with ./symfony
>> doctrine:generate-admin is possible to inject SQL in the url.
>>
>> Example:
>>
>> http://example.com/backend_dev.php/partner?sort=status&sort_type=desc
>> LIMIT 1 --
>
> Indeed.
>
>>
>>
>> This is with symfony 1.4 svn.
>>
>> Does anybody know how to protect against this security problem?
>
> First and most important - don't expose backend to untrusted users.
>
> Other ideas highly welcome :)
>

And - it's not "possible SQL injection" - it is SQL injection, so I'm
CC'ing to symfony-devs

Regards,
M

-- 
You received this message because you are subscribed to the Google Groups 
"symfony users" group.
To post to this group, send email to symfony-us...@googlegroups.com.
To unsubscribe from this group, send email to 
symfony-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/symfony-users?hl=en.

Reply via email to