danielw Posted July 11, 2006 Report Share Posted July 11, 2006 Ich finde es bedenklich, da? ich im Quelltext von xt:Commerce Angriffsm?glichkeiten gegen SQL Injection finden konnte. Beispiel gef?llig? $oder_total_query=xtc_db_query("SELECT title, text, class, value, sort_order FROM ".TABLE_ORDERS_TOTAL." WHERE orders_id='".$_GET['oID']."' ORDER BY sort_order ASC"); Entwicklerteam: W?re es m?glich wenigstens Metazeichen Escaping einzubauen? Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.