diff options
author | Dan McGee <dan@archlinux.org> | 2011-03-01 12:31:35 -0600 |
---|---|---|
committer | Lukas Fleischer <archlinux@cryptocrack.de> | 2011-03-01 20:27:49 +0100 |
commit | 90485e8f422cec6d23af38574a53705fa7de008b (patch) | |
tree | 9df70fc784fd2ff604a58bbbace7ca9dfd7ea938 /web/template/search_accounts_form.php | |
parent | a10ce40cbe410836a6bffc6026be3c9544636f3e (diff) | |
download | aurweb-90485e8f422cec6d23af38574a53705fa7de008b.tar.xz |
Fix potential injection vulnerability
We trusted the values we pulled out of the IDs array and never coerced
them to integers, passing them to the backend unescaped and uncasted.
Ensure they are treated as integers only and validate the resulting
value is > 0.
Signed-off-by: Dan McGee <dan@archlinux.org>
Signed-off-by: Lukas Fleischer <archlinux@cryptocrack.de>
Diffstat (limited to 'web/template/search_accounts_form.php')
0 files changed, 0 insertions, 0 deletions