Skip to content

SQL injections in PHP scripts #33

@cedlecomte

Description

@cedlecomte

From rgaco...@gmail.com on May 28, 2012 11:03:18

Hi,

I'm afraid there is several potential SQL injections in the PHP scripts provided with RTG2.
In 95.php, view.php and rtg.php, all values are retrieved from user submitted parameters then directly passed as-is to mysql_query (or potentially pg_query in rtg.php).

I know the best practice is to restrict access to the RTG interface to trusted users, but I think this needs to be fixed nevertheless. Given that there is not a lot of different requests, using prepared statements seems to be the easiest way to do it.

Please don't hesitate to contact me if you need more information or if you disagree with this report.

Regards,

Rémi Gacogne

Original issue: http://code.google.com/p/rtg2/issues/detail?id=35

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions