<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to 13: SQL injection (security vulnerability)</title><link>https://sourceforge.net/p/phpmysqlezedit/bugs/13/</link><description>Recent changes to 13: SQL injection (security vulnerability)</description><atom:link href="https://sourceforge.net/p/phpmysqlezedit/bugs/13/feed.rss" rel="self"/><language>en</language><lastBuildDate>Wed, 24 Feb 2016 22:16:10 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/phpmysqlezedit/bugs/13/feed.rss" rel="self" type="application/rss+xml"/><item><title>#13 SQL injection (security vulnerability)</title><link>https://sourceforge.net/p/phpmysqlezedit/bugs/13/?limit=25#a7b3</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Yep. Our later applications include variable cleansing. When the upgrade for this (to mysqli, among other things) comes up, we'll likely also clean it for injection. In theory, however, this is mostly used for "the boss wants to be able to edit this table ... but we don't want her to have access to the entire system ... so here's a simple way to allow her access to this one table/DB only". Avoiding phpMyAdmin access for the boss. 8-)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">TheSatinKnight</dc:creator><pubDate>Wed, 24 Feb 2016 22:16:10 -0000</pubDate><guid>https://sourceforge.net851d2133a2eddc2738904e56518c97a4c47ae9d8</guid></item><item><title>SQL injection (security vulnerability)</title><link>https://sourceforge.net/p/phpmysqlezedit/bugs/13/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;It is trivial to perform SQL injection.&lt;/p&gt;
&lt;p&gt;Example input data for search field&lt;br/&gt;
&lt;code&gt;foo ' or 1=1 or  '&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Value of $SQL variable&lt;br/&gt;
&lt;code&gt;select * from v_log WHERE id LIKE '%foo ' or 1=1 or '%' order by id desc limit 100&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Of course a bad guy would injection something more interesting&lt;/p&gt;
&lt;p&gt;This was tested with SVN r17&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Ziem</dc:creator><pubDate>Wed, 24 Feb 2016 21:30:59 -0000</pubDate><guid>https://sourceforge.net03d6dd96db31c718977f17fbce638a7000eb2c10</guid></item></channel></rss>