Code Security Audit

News and announcements will be posted here.
Post Reply
User avatar
The Beatles
Fear me for I am root
Posts: 6285
Joined: Tue May 24, 2005 8:12 pm

Post by The Beatles »

I've started looking over the FAF code for potential security holes proactively. I've found one potentially dangerous issue already, results will be posted once the code audit is over.
:wq
User avatar
The Beatles
Fear me for I am root
Posts: 6285
Joined: Tue May 24, 2005 8:12 pm

Post by The Beatles »

At least one definite SQL injection bug has been found (and fixed).

[edit] Removed, so script kiddies don't run wild with other Promi variants in the wild. ~Beatles
:wq
Turock
Forum Maniac
Posts: 289
Joined: Sat Jan 07, 2006 12:45 am
Contact:

Post by Turock »

I'm assuming that:

$contentious_variable = trim(addslashes($contentious_variable));

before the query would be the fix?


[edit] Removed, so script kiddies don't run wild with other Promi variants in the wild. ~Beatles
User avatar
The Beatles
Fear me for I am root
Posts: 6285
Joined: Tue May 24, 2005 8:12 pm

Post by The Beatles »

I used $contentious_variable = mysql_real_escape_string($contentious_variable);

Our new built-in sqlQuotes() function was modified to use that method as well.


[edit] Removed, so script kiddies don't run wild with other Promi variants in the wild. ~Beatles
:wq
Turock
Forum Maniac
Posts: 289
Joined: Sat Jan 07, 2006 12:45 am
Contact:

Post by Turock »

I guess its all basically the same. I will use your method so the scripts remain similar.
Turock
Forum Maniac
Posts: 289
Joined: Sat Jan 07, 2006 12:45 am
Contact:

Post by Turock »

I should have posted that in a PM :) Sorry.
User avatar
The Beatles
Fear me for I am root
Posts: 6285
Joined: Tue May 24, 2005 8:12 pm

Post by The Beatles »

I was the indiscreet one to start with. I had been so surprised by the vulnerabilities.
:wq
Post Reply
  • Members connected in real time

    🔒 Close the panel of connected members