Private GIT

Skip to content
Snippets Groups Projects
Unverified Commit 16e7a94f authored by Gary Allan's avatar Gary Allan
Browse files

Bugfix: SQL injection in custom field enum/set types

Reported by Peng Zhou @zpbrent
parent 470a175f
No related branches found
No related tags found
No related merge requests found
...@@ -673,7 +673,7 @@ class Admin extends Common_functions { ...@@ -673,7 +673,7 @@ class Admin extends Common_functions {
# set type definition and size of needed # set type definition and size of needed
if($field['fieldType']=="bool" || $field['fieldType']=="text" || $field['fieldType']=="date" || $field['fieldType']=="datetime") { $field['ftype'] = $field['fieldType']; } if($field['fieldType']=="bool" || $field['fieldType']=="text" || $field['fieldType']=="date" || $field['fieldType']=="datetime") { $field['ftype'] = $field['fieldType']; }
else { $field['ftype'] = $field['fieldType']."(".$field['fieldSize'].")"; } else { $field['ftype'] = $field['fieldType']."( :enumset )"; }
# default value null # default value null
$field['fieldDefault'] = is_blank($field['fieldDefault']) ? NULL : $field['fieldDefault']; $field['fieldDefault'] = is_blank($field['fieldDefault']) ? NULL : $field['fieldDefault'];
...@@ -709,6 +709,7 @@ class Admin extends Common_functions { ...@@ -709,6 +709,7 @@ class Admin extends Common_functions {
$params = array(); $params = array();
if (strpos($query, ":default")>0) $params['default'] = $field['fieldDefault']; if (strpos($query, ":default")>0) $params['default'] = $field['fieldDefault'];
if (strpos($query, ":comment")>0) $params['comment'] = $field['Comment']; if (strpos($query, ":comment")>0) $params['comment'] = $field['Comment'];
if (strpos($query, ":enumset")>0) $params['enumset'] = $field['fieldSize'];
# execute # execute
try { $res = $this->Database->runQuery($query, $params); } try { $res = $this->Database->runQuery($query, $params); }
......
...@@ -7,6 +7,7 @@ ...@@ -7,6 +7,7 @@
Security Fixes: Security Fixes:
---------------------------- ----------------------------
+ SQL injection in custom field enum/set types;
+ XSS (reflected) in 'bw-calulator-result.php'; + XSS (reflected) in 'bw-calulator-result.php';
+ XSS (reflected) by invalid email address response; + XSS (reflected) by invalid email address response;
+ XSS (reflected) by /app/tools/subnet-masks/popup.php (#3738); + XSS (reflected) by /app/tools/subnet-masks/popup.php (#3738);
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment