I've committed a fix to Subversion and will be releasing soon. Please
test the fix in the meantime and report any issues here or on Trac.

http://trac.symfony-project.org/changeset/28260

Thanks,
Kris

On Feb 24, 1:35 pm, Michał Piotrowski <mkkp...@gmail.com> wrote:
> W dniu 24 lutego 2010 22:32 u¿ytkownik Micha³ Piotrowski
> <mkkp...@gmail.com> napisa³:
>
>
>
>
>
> > 2010/2/24 roko <gargamel...@gmail.com>:
> >> I found that on backend admin modules generated with ./symfony
> >> doctrine:generate-admin is possible to inject SQL in the url.
>
> >> Example:
>
> >>http://example.com/backend_dev.php/partner?sort=status&sort_type=desc
> >> LIMIT 1 --
>
> > Indeed.
>
> >> This is with symfony 1.4 svn.
>
> >> Does anybody know how to protect against this security problem?
>
> > First and most important - don't expose backend to untrusted users.
>
> > Other ideas highly welcome :)
>
> And - it's not "possible SQL injection" - it is SQL injection, so I'm
> CC'ing to symfony-devs
>
> Regards,
> M

-- 
You received this message because you are subscribed to the Google Groups 
"symfony users" group.
To post to this group, send email to symfony-us...@googlegroups.com.
To unsubscribe from this group, send email to 
symfony-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/symfony-users?hl=en.

Reply via email to