![]() |
Quote:
Thank you. Ok the Addon in the appendix |
If it's an SQL injection problem, then it's probably these lines in EM2008.php:
Code:
$sql = "INSERT INTO " . TABLE_PREFIX . "rth_em08_bets (user_id,em_game_number,bet_result,bet_home,bet_visitor) At the very least, I'd do ... Code:
$game = $db->escape_string($game); -- hugh |
Quote:
--------------- Added [DATE]1201713109[/DATE] at [TIME]1201713109[/TIME] --------------- One has me further to place called these obviously also a problem to explain... Quote:
Quote:
One wrote me: "Das are not no stringers, and/or should be. = > intval() or other method over to guarantee that it more integer sind" |
Yes, I just pointed out the obvious one. There is other work needs doing to proeprly sanitize your inputs.
Basically any user input you use in a query should be cleaned properly - that is, make sure it's been through the vbulletin GPC cleaner, and unless you have specific reasons not to, use escape_string. And of course NEVER use $_GET, $_POST or $_REQUEST directly. Always run all input through the vbulletin GPC cleaner. Suggest you read this excellent article: https://vborg.vbsupport.ru/showthread.php?t=154411 -- hugh |
Thank you @all.
The Thread can Closed! |
All times are GMT. The time now is 02:26 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|