I've committed a fix to Subversion and will be releasing soon. Please test the fix in the meantime and report any issues here or on Trac.
http://trac.symfony-project.org/changeset/28260 Thanks, Kris On Feb 24, 1:35 pm, Michał Piotrowski <mkkp...@gmail.com> wrote: > W dniu 24 lutego 2010 22:32 u¿ytkownik Micha³ Piotrowski > <mkkp...@gmail.com> napisa³: > > > > > > > 2010/2/24 roko <gargamel...@gmail.com>: > >> I found that on backend admin modules generated with ./symfony > >> doctrine:generate-admin is possible to inject SQL in the url. > > >> Example: > > >>http://example.com/backend_dev.php/partner?sort=status&sort_type=desc > >> LIMIT 1 -- > > > Indeed. > > >> This is with symfony 1.4 svn. > > >> Does anybody know how to protect against this security problem? > > > First and most important - don't expose backend to untrusted users. > > > Other ideas highly welcome :) > > And - it's not "possible SQL injection" - it is SQL injection, so I'm > CC'ing to symfony-devs > > Regards, > M -- You received this message because you are subscribed to the Google Groups "symfony users" group. To post to this group, send email to symfony-us...@googlegroups.com. To unsubscribe from this group, send email to symfony-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/symfony-users?hl=en.